Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 11:43
General
-
Target
Test.exe
-
Size
45KB
-
MD5
31e2584bcba7f9a5ea5f3e887d8077b3
-
SHA1
7c8ea9431ba60c90d545414d90cad22e2bc32895
-
SHA256
e678fcdcf1967dc80092853a6fbffbec6c7c32250ce26f8f46f492febb966030
-
SHA512
08ab778afc4d5e46973207c973d336230325506307e0a39a6b965e507bd24cd46c768a9298d384fa7896be6f8f3fcdc3f5dacc47eacf267c9b66ce58390be022
-
SSDEEP
768:tdhO/poiiUcjlJInvylF2I8H9Xqk5nWEZ5SbTDaiuI7CPW5V:jw+jjgnqlF2I8H9XqcnW85SbTvuId
Malware Config
Extracted
xenorat
22.ip.gl.ply.gg
Xeno_rat_nd8912d
-
delay
3000
-
install_path
temp
-
port
54701
-
startup_name
Startup
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/3172-1-0x0000000000FA0000-0x0000000000FB2000-memory.dmp family_xenorat behavioral1/files/0x000800000002343a-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Test.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 Test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2992 3172 Test.exe 82 PID 3172 wrote to memory of 2992 3172 Test.exe 82 PID 3172 wrote to memory of 2992 3172 Test.exe 82 PID 2992 wrote to memory of 3032 2992 Test.exe 83 PID 2992 wrote to memory of 3032 2992 Test.exe 83 PID 2992 wrote to memory of 3032 2992 Test.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Test.exe"C:\Users\Admin\AppData\Local\Temp\Test.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Test.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Startup" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9422.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD531e2584bcba7f9a5ea5f3e887d8077b3
SHA17c8ea9431ba60c90d545414d90cad22e2bc32895
SHA256e678fcdcf1967dc80092853a6fbffbec6c7c32250ce26f8f46f492febb966030
SHA51208ab778afc4d5e46973207c973d336230325506307e0a39a6b965e507bd24cd46c768a9298d384fa7896be6f8f3fcdc3f5dacc47eacf267c9b66ce58390be022
-
Filesize
1KB
MD57cf72d8a00eb0d62547fe8869f80d107
SHA1c32ab3038f07b2d7bd8db32923cc8334304c337c
SHA2563128d0417530dd95348e68e66c978705a65e5678e67dbdd9674429d69312925c
SHA5122942ada2be349fe1fb5dd242e4a559fb7f904643b4d0fab6012457ec3bfee8e6a61001a024dfb224b63d24fbb4cf1ee7979582e7954a82eea0a442e59cc02fae