Analysis
-
max time kernel
82s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 14:09
Behavioral task
behavioral1
Sample
Sleezy Perm Spoofer.exe
Resource
win7-20240708-en
Errors
General
-
Target
Sleezy Perm Spoofer.exe
-
Size
45KB
-
MD5
3857559693c3664d1d4a23e347b22a97
-
SHA1
901a46aa21849b31a78376103d132fd228b6c319
-
SHA256
cb77bce6f9be0ea60169d0eaf76b5ef231c47f3996cccc75abc60f7d54dff7e8
-
SHA512
5136d51473f2214ad83fa43c603839224ea736ba436e5ce67d8c1d57390e5969e075c6c8d3fb914f835ca42bf49b369e8962e64326f807b4a6badb5340ebec81
-
SSDEEP
768:bdhO/poiiUcjlJInfTwH9Xqk5nWEZ5SbTDaJWI7CPW5M:Jw+jjgncH9XqcnW85SbTgWI0
Malware Config
Extracted
xenorat
4.tcp.eu.ngrok.io
Sleezy Perm
-
delay
5000
-
install_path
temp
-
port
19096
-
startup_name
svchost.exe
Signatures
-
Detect XenoRat Payload 5 IoCs
resource yara_rule behavioral2/memory/3732-1-0x0000000000850000-0x0000000000862000-memory.dmp family_xenorat behavioral2/files/0x0008000000023412-6.dat family_xenorat behavioral2/memory/4520-21-0x0000000005370000-0x000000000537A000-memory.dmp family_xenorat behavioral2/memory/4520-22-0x0000000005430000-0x000000000552A000-memory.dmp family_xenorat behavioral2/memory/4520-23-0x0000000000770000-0x000000000077A000-memory.dmp family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Sleezy Perm Spoofer.exe -
Executes dropped EXE 1 IoCs
pid Process 4520 Sleezy Perm Spoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 20 4.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleezy Perm Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleezy Perm Spoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe 4520 Sleezy Perm Spoofer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4520 Sleezy Perm Spoofer.exe Token: SeShutdownPrivilege 4520 Sleezy Perm Spoofer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4520 3732 Sleezy Perm Spoofer.exe 82 PID 3732 wrote to memory of 4520 3732 Sleezy Perm Spoofer.exe 82 PID 3732 wrote to memory of 4520 3732 Sleezy Perm Spoofer.exe 82 PID 4520 wrote to memory of 2420 4520 Sleezy Perm Spoofer.exe 83 PID 4520 wrote to memory of 2420 4520 Sleezy Perm Spoofer.exe 83 PID 4520 wrote to memory of 2420 4520 Sleezy Perm Spoofer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sleezy Perm Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Sleezy Perm Spoofer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Sleezy Perm Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Sleezy Perm Spoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp74D2.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD53857559693c3664d1d4a23e347b22a97
SHA1901a46aa21849b31a78376103d132fd228b6c319
SHA256cb77bce6f9be0ea60169d0eaf76b5ef231c47f3996cccc75abc60f7d54dff7e8
SHA5125136d51473f2214ad83fa43c603839224ea736ba436e5ce67d8c1d57390e5969e075c6c8d3fb914f835ca42bf49b369e8962e64326f807b4a6badb5340ebec81
-
Filesize
1KB
MD5f91d13e2a2b21b6180819b1879a069e4
SHA194280d71b40b72773000b4f0f4dceb9c2bc9a279
SHA256772dd443b70d8ac62e89de9e3040d1b436aaa60cf28a8b245ec5414ae15c6860
SHA512963086710d642f4b90881a3d0fe43475c53f00ef5a7c6a4ddc087bb5c94c484ce57260305e9c92425d64a663154632cbd40442dbc07e9a9ba5644028b08fd3b2