Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-09-2024 12:06
General
-
Target
Te.exe
-
Size
45KB
-
MD5
eaec451acfbf48b54a7b45bd13539501
-
SHA1
89294006ab45dd517ba8d557cc6c31293b7e730b
-
SHA256
bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
-
SHA512
ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1
-
SSDEEP
768:6dhO/poiiUcjlJInJgH9Xqk5nWEZ5SbTDaSWI7CPW5M:cw+jjgnOH9XqcnW85SbTbWIU
Malware Config
Extracted
xenorat
2001:4453:622:6a00:15c9:7ca3:6524:4c7b
Xeno_rat_nd8912d
-
delay
3000
-
install_path
temp
-
port
4444
-
startup_name
Startup
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/5052-1-0x00000000007E0000-0x00000000007F2000-memory.dmp family_xenorat behavioral1/files/0x000800000001ac4b-5.dat family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 5012 Te.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1704 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5012 5052 Te.exe 72 PID 5052 wrote to memory of 5012 5052 Te.exe 72 PID 5052 wrote to memory of 5012 5052 Te.exe 72 PID 5012 wrote to memory of 1704 5012 Te.exe 73 PID 5012 wrote to memory of 1704 5012 Te.exe 73 PID 5012 wrote to memory of 1704 5012 Te.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Te.exe"C:\Users\Admin\AppData\Local\Temp\Te.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Startup" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7407.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
45KB
MD5eaec451acfbf48b54a7b45bd13539501
SHA189294006ab45dd517ba8d557cc6c31293b7e730b
SHA256bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
SHA512ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1
-
Filesize
1KB
MD5c19ebedfe47bf314dd3c742aea84c798
SHA128874d6ad3e2eb3b658d1fa00e86c121e8beb25c
SHA256dd242c33fef986b3b9392950e27024b16246615509ea77234af56f1d526c1297
SHA5127225ecb13071bb2694528794808b0cae51794ad84a0f3a1556f4806aadab07493bf2900c43ab858d67bb217cdb308a56c0db27565f82234333c360a4c045e19f