Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 16:31
Behavioral task
behavioral1
Sample
2bbb433718d061e161f1d0e224451746.exe
Resource
win7-20240903-en
General
-
Target
2bbb433718d061e161f1d0e224451746.exe
-
Size
45KB
-
MD5
2bbb433718d061e161f1d0e224451746
-
SHA1
94d37443c9d9b71997f4918106533b76c01d8032
-
SHA256
cb15dc95e0a14080e8c3df816b6d54a101c3b4a307a8db0d71131869602480d9
-
SHA512
d61d90ecffb3ec0debc1aa679bc1ddcafeafff2cf466ee9e29b630098d2b9f6e94c994617740dc31d3962ef05371831473311cd9a2112d1ab824cd6240f71bcb
-
SSDEEP
768:qdhO/poiiUcjlJInjTH9Xqk5nWEZ5SbTDaLIuI7CPW5N:Mw+jjgnPH9XqcnW85SbTwIuIl
Malware Config
Extracted
xenorat
82.64.210.112
update_discord_nd8912d
-
delay
5000
-
install_path
appdata
-
port
25565
-
startup_name
update_blender
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1480-1-0x0000000000C50000-0x0000000000C62000-memory.dmp family_xenorat behavioral1/files/0x0008000000016d4f-4.dat family_xenorat behavioral1/memory/2380-9-0x00000000013B0000-0x00000000013C2000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2380 2bbb433718d061e161f1d0e224451746.exe -
Loads dropped DLL 1 IoCs
pid Process 1480 2bbb433718d061e161f1d0e224451746.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bbb433718d061e161f1d0e224451746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bbb433718d061e161f1d0e224451746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 1480 wrote to memory of 2380 1480 2bbb433718d061e161f1d0e224451746.exe 30 PID 2380 wrote to memory of 2744 2380 2bbb433718d061e161f1d0e224451746.exe 32 PID 2380 wrote to memory of 2744 2380 2bbb433718d061e161f1d0e224451746.exe 32 PID 2380 wrote to memory of 2744 2380 2bbb433718d061e161f1d0e224451746.exe 32 PID 2380 wrote to memory of 2744 2380 2bbb433718d061e161f1d0e224451746.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bbb433718d061e161f1d0e224451746.exe"C:\Users\Admin\AppData\Local\Temp\2bbb433718d061e161f1d0e224451746.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\XenoManager\2bbb433718d061e161f1d0e224451746.exe"C:\Users\Admin\AppData\Roaming\XenoManager\2bbb433718d061e161f1d0e224451746.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "update_blender" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD920.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d36ad8b4915c10d4c3b07440db3b8e1d
SHA13069c7313810b153a07b8a9bed36df1366b742c6
SHA256a74788542d7f1952dfeed42e2ef0f4d0d62f4cdb9339fc7bdf03c023a37f693e
SHA512a7171ffd4fa2328917e3293096fcd1984b2a86239e6dcbfa29ef4a12bca3607bfcc2d3ed25c51ee6fcae3389b953fcf5a6acb54454e852cf137eb71ebd7c845e
-
Filesize
45KB
MD52bbb433718d061e161f1d0e224451746
SHA194d37443c9d9b71997f4918106533b76c01d8032
SHA256cb15dc95e0a14080e8c3df816b6d54a101c3b4a307a8db0d71131869602480d9
SHA512d61d90ecffb3ec0debc1aa679bc1ddcafeafff2cf466ee9e29b630098d2b9f6e94c994617740dc31d3962ef05371831473311cd9a2112d1ab824cd6240f71bcb