Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 02:49
Behavioral task
behavioral1
Sample
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
Resource
win7-20240903-en
General
-
Target
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
-
Size
45KB
-
MD5
283c2f66ccef3a27a10e74fe8f063918
-
SHA1
ca9387655ff9b533dd36cf5641fd4eb8f88fb999
-
SHA256
f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1
-
SHA512
8243d21a66c6d52cc09d16403e7efd643fd292c7b22559472df5ea96532701799b4900527c10e8a0fee2226dfd959b0d662fffb0b9da4af0aebdbaf70756386f
-
SSDEEP
768:GdhO/poiiUcjlJInLn+eP3H9Xqk5nWEZ5SbTDajuI7CPW5v:ww+jjgnjH9XqcnW85SbTWuIn
Malware Config
Extracted
xenorat
zenofs.zapto.org
Svcchost
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4364-1-0x0000000000880000-0x0000000000892000-memory.dmp family_xenorat behavioral2/files/0x00070000000234d4-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Executes dropped EXE 1 IoCs
pid Process 4236 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4236 4364 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 82 PID 4364 wrote to memory of 4236 4364 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 82 PID 4364 wrote to memory of 4236 4364 f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"C:\Users\Admin\AppData\Local\Temp\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\XenoManager\f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1.exe
Filesize45KB
MD5283c2f66ccef3a27a10e74fe8f063918
SHA1ca9387655ff9b533dd36cf5641fd4eb8f88fb999
SHA256f770b7e25d959f700c9119cb1d9a5ef444634a335ea9f230f06b51fdaa487ad1
SHA5128243d21a66c6d52cc09d16403e7efd643fd292c7b22559472df5ea96532701799b4900527c10e8a0fee2226dfd959b0d662fffb0b9da4af0aebdbaf70756386f