Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 16:31
Behavioral task
behavioral1
Sample
2bbb433718d061e161f1d0e224451746.exe
Resource
win7-20240903-en
General
-
Target
2bbb433718d061e161f1d0e224451746.exe
-
Size
45KB
-
MD5
2bbb433718d061e161f1d0e224451746
-
SHA1
94d37443c9d9b71997f4918106533b76c01d8032
-
SHA256
cb15dc95e0a14080e8c3df816b6d54a101c3b4a307a8db0d71131869602480d9
-
SHA512
d61d90ecffb3ec0debc1aa679bc1ddcafeafff2cf466ee9e29b630098d2b9f6e94c994617740dc31d3962ef05371831473311cd9a2112d1ab824cd6240f71bcb
-
SSDEEP
768:qdhO/poiiUcjlJInjTH9Xqk5nWEZ5SbTDaLIuI7CPW5N:Mw+jjgnPH9XqcnW85SbTwIuIl
Malware Config
Extracted
xenorat
82.64.210.112
update_discord_nd8912d
-
delay
5000
-
install_path
appdata
-
port
25565
-
startup_name
update_blender
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4672-1-0x0000000000E30000-0x0000000000E42000-memory.dmp family_xenorat behavioral2/files/0x0009000000023416-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 2bbb433718d061e161f1d0e224451746.exe -
Executes dropped EXE 1 IoCs
pid Process 4232 2bbb433718d061e161f1d0e224451746.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bbb433718d061e161f1d0e224451746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bbb433718d061e161f1d0e224451746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3972 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4232 4672 2bbb433718d061e161f1d0e224451746.exe 82 PID 4672 wrote to memory of 4232 4672 2bbb433718d061e161f1d0e224451746.exe 82 PID 4672 wrote to memory of 4232 4672 2bbb433718d061e161f1d0e224451746.exe 82 PID 4232 wrote to memory of 3972 4232 2bbb433718d061e161f1d0e224451746.exe 83 PID 4232 wrote to memory of 3972 4232 2bbb433718d061e161f1d0e224451746.exe 83 PID 4232 wrote to memory of 3972 4232 2bbb433718d061e161f1d0e224451746.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bbb433718d061e161f1d0e224451746.exe"C:\Users\Admin\AppData\Local\Temp\2bbb433718d061e161f1d0e224451746.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\XenoManager\2bbb433718d061e161f1d0e224451746.exe"C:\Users\Admin\AppData\Roaming\XenoManager\2bbb433718d061e161f1d0e224451746.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "update_blender" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84B1.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2bbb433718d061e161f1d0e224451746.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5d36ad8b4915c10d4c3b07440db3b8e1d
SHA13069c7313810b153a07b8a9bed36df1366b742c6
SHA256a74788542d7f1952dfeed42e2ef0f4d0d62f4cdb9339fc7bdf03c023a37f693e
SHA512a7171ffd4fa2328917e3293096fcd1984b2a86239e6dcbfa29ef4a12bca3607bfcc2d3ed25c51ee6fcae3389b953fcf5a6acb54454e852cf137eb71ebd7c845e
-
Filesize
45KB
MD52bbb433718d061e161f1d0e224451746
SHA194d37443c9d9b71997f4918106533b76c01d8032
SHA256cb15dc95e0a14080e8c3df816b6d54a101c3b4a307a8db0d71131869602480d9
SHA512d61d90ecffb3ec0debc1aa679bc1ddcafeafff2cf466ee9e29b630098d2b9f6e94c994617740dc31d3962ef05371831473311cd9a2112d1ab824cd6240f71bcb