Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:16
Behavioral task
behavioral1
Sample
Te.exe
Resource
win7-20240903-en
General
-
Target
Te.exe
-
Size
45KB
-
MD5
eaec451acfbf48b54a7b45bd13539501
-
SHA1
89294006ab45dd517ba8d557cc6c31293b7e730b
-
SHA256
bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
-
SHA512
ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1
-
SSDEEP
768:6dhO/poiiUcjlJInJgH9Xqk5nWEZ5SbTDaSWI7CPW5M:cw+jjgnOH9XqcnW85SbTbWIU
Malware Config
Extracted
xenorat
2001:4453:622:6a00:15c9:7ca3:6524:4c7b
Xeno_rat_nd8912d
-
delay
3000
-
install_path
temp
-
port
4444
-
startup_name
Startup
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2512-1-0x0000000001000000-0x0000000001012000-memory.dmp family_xenorat behavioral1/files/0x00080000000174b4-4.dat family_xenorat behavioral1/memory/2164-9-0x0000000000B20000-0x0000000000B32000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2164 Te.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 Te.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2336 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2164 2512 Te.exe 30 PID 2512 wrote to memory of 2164 2512 Te.exe 30 PID 2512 wrote to memory of 2164 2512 Te.exe 30 PID 2512 wrote to memory of 2164 2512 Te.exe 30 PID 2164 wrote to memory of 2336 2164 Te.exe 31 PID 2164 wrote to memory of 2336 2164 Te.exe 31 PID 2164 wrote to memory of 2336 2164 Te.exe 31 PID 2164 wrote to memory of 2336 2164 Te.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Te.exe"C:\Users\Admin\AppData\Local\Temp\Te.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Startup" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA94A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c19ebedfe47bf314dd3c742aea84c798
SHA128874d6ad3e2eb3b658d1fa00e86c121e8beb25c
SHA256dd242c33fef986b3b9392950e27024b16246615509ea77234af56f1d526c1297
SHA5127225ecb13071bb2694528794808b0cae51794ad84a0f3a1556f4806aadab07493bf2900c43ab858d67bb217cdb308a56c0db27565f82234333c360a4c045e19f
-
Filesize
45KB
MD5eaec451acfbf48b54a7b45bd13539501
SHA189294006ab45dd517ba8d557cc6c31293b7e730b
SHA256bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
SHA512ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1