Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 14:27
Behavioral task
behavioral1
Sample
Sleezy Perm Spoofer.exe
Resource
win7-20240708-en
General
-
Target
Sleezy Perm Spoofer.exe
-
Size
78KB
-
MD5
7628121165d4796f1ead2df63225b7e2
-
SHA1
56e0300ef52e9ef736d266a07cabf9b5bdee3c3e
-
SHA256
a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
-
SHA512
fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
SSDEEP
1536:QNo/jOtwwm0ZvHTPkorpS/WEQ55HL6VG28SPCYbxfE:QRm09dP5HLfSKYbxfE
Malware Config
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral2/memory/4532-1-0x0000000000350000-0x000000000036A000-memory.dmp family_xenorat behavioral2/files/0x00070000000234d0-7.dat family_xenorat behavioral2/memory/396-24-0x0000000001220000-0x0000000001232000-memory.dmp family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sleezy Perm Spoofer.exe -
Executes dropped EXE 1 IoCs
pid Process 396 Sleezy Perm Spoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 4.tcp.eu.ngrok.io 47 4.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleezy Perm Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleezy Perm Spoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe 396 Sleezy Perm Spoofer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 396 Sleezy Perm Spoofer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4532 wrote to memory of 396 4532 Sleezy Perm Spoofer.exe 82 PID 4532 wrote to memory of 396 4532 Sleezy Perm Spoofer.exe 82 PID 4532 wrote to memory of 396 4532 Sleezy Perm Spoofer.exe 82 PID 396 wrote to memory of 5056 396 Sleezy Perm Spoofer.exe 83 PID 396 wrote to memory of 5056 396 Sleezy Perm Spoofer.exe 83 PID 396 wrote to memory of 5056 396 Sleezy Perm Spoofer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sleezy Perm Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Sleezy Perm Spoofer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Sleezy Perm Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Sleezy Perm Spoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD64.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
78KB
MD57628121165d4796f1ead2df63225b7e2
SHA156e0300ef52e9ef736d266a07cabf9b5bdee3c3e
SHA256a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
SHA512fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
Filesize
1KB
MD5f91d13e2a2b21b6180819b1879a069e4
SHA194280d71b40b72773000b4f0f4dceb9c2bc9a279
SHA256772dd443b70d8ac62e89de9e3040d1b436aaa60cf28a8b245ec5414ae15c6860
SHA512963086710d642f4b90881a3d0fe43475c53f00ef5a7c6a4ddc087bb5c94c484ce57260305e9c92425d64a663154632cbd40442dbc07e9a9ba5644028b08fd3b2