Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 02:49
Behavioral task
behavioral1
Sample
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
Resource
win7-20240903-en
General
-
Target
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
-
Size
45KB
-
MD5
283c2f66ccef3a27a10e74fe8f063918
-
SHA1
ca9387655ff9b533dd36cf5641fd4eb8f88fb999
-
SHA256
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1
-
SHA512
8243d21a66c6d52cc09d16403e7efd643fd292c7b22559472df5ea96532701799b4900527c10e8a0fee2226dfd959b0d662fffb0b9da4af0aebdbaf70756386f
-
SSDEEP
768:GdhO/poiiUcjlJInLn+eP3H9Xqk5nWEZ5SbTDajuI7CPW5v:ww+jjgnjH9XqcnW85SbTWuIn
Malware Config
Extracted
xenorat
zenofs.zapto.org
Svcchost
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2084-1-0x00000000000D0000-0x00000000000E2000-memory.dmp family_xenorat behavioral1/files/0x0008000000015d59-4.dat family_xenorat behavioral1/memory/1264-10-0x00000000002A0000-0x00000000002B2000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 1264 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1264 2084 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 30 PID 2084 wrote to memory of 1264 2084 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 30 PID 2084 wrote to memory of 1264 2084 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 30 PID 2084 wrote to memory of 1264 2084 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"C:\Users\Admin\AppData\Local\Temp\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
Filesize45KB
MD5283c2f66ccef3a27a10e74fe8f063918
SHA1ca9387655ff9b533dd36cf5641fd4eb8f88fb999
SHA256f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1
SHA5128243d21a66c6d52cc09d16403e7efd643fd292c7b22559472df5ea96532701799b4900527c10e8a0fee2226dfd959b0d662fffb0b9da4af0aebdbaf70756386f