Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 01:16
Behavioral task
behavioral1
Sample
Te.exe
Resource
win7-20240903-en
General
-
Target
Te.exe
-
Size
45KB
-
MD5
eaec451acfbf48b54a7b45bd13539501
-
SHA1
89294006ab45dd517ba8d557cc6c31293b7e730b
-
SHA256
bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
-
SHA512
ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1
-
SSDEEP
768:6dhO/poiiUcjlJInJgH9Xqk5nWEZ5SbTDaSWI7CPW5M:cw+jjgnOH9XqcnW85SbTbWIU
Malware Config
Extracted
xenorat
2001:4453:622:6a00:15c9:7ca3:6524:4c7b
Xeno_rat_nd8912d
-
delay
3000
-
install_path
temp
-
port
4444
-
startup_name
Startup
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4212-1-0x0000000000410000-0x0000000000422000-memory.dmp family_xenorat behavioral2/files/0x00080000000233be-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Te.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 Te.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4212 wrote to memory of 4724 4212 Te.exe 86 PID 4212 wrote to memory of 4724 4212 Te.exe 86 PID 4212 wrote to memory of 4724 4212 Te.exe 86 PID 4724 wrote to memory of 4712 4724 Te.exe 87 PID 4724 wrote to memory of 4712 4724 Te.exe 87 PID 4724 wrote to memory of 4712 4724 Te.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Te.exe"C:\Users\Admin\AppData\Local\Temp\Te.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Te.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Startup" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD83.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5eaec451acfbf48b54a7b45bd13539501
SHA189294006ab45dd517ba8d557cc6c31293b7e730b
SHA256bafe5e904cddcc11afd3135e58a736ccd055ffe4e217acde4289780e2801312f
SHA512ac4e3427d9de004bf60ed4a91844a36395c3164902482c7d6ee37f76fa962149364544c52553f6b3ea7f1d032849ee54187401556a68f3ae3747228257b7b7c1
-
Filesize
1KB
MD5c19ebedfe47bf314dd3c742aea84c798
SHA128874d6ad3e2eb3b658d1fa00e86c121e8beb25c
SHA256dd242c33fef986b3b9392950e27024b16246615509ea77234af56f1d526c1297
SHA5127225ecb13071bb2694528794808b0cae51794ad84a0f3a1556f4806aadab07493bf2900c43ab858d67bb217cdb308a56c0db27565f82234333c360a4c045e19f