Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
Quote List.scr.exe
Resource
win7-20240903-en
General
-
Target
Quote List.scr.exe
-
Size
569KB
-
MD5
dc2bce43a2b3398e375fdb600650a576
-
SHA1
a6c6ccf9affa2095eb481950f036c00cd3c4e437
-
SHA256
509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
-
SHA512
e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0
-
SSDEEP
12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg
Malware Config
Extracted
xenorat
66.63.168.142
Microsoft_nd8912d
-
delay
5
-
install_path
temp
-
port
4782
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 7 IoCs
resource yara_rule behavioral1/memory/2316-22-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2316-19-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2316-17-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2316-13-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2316-11-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2120-58-0x0000000000420000-0x000000000042C000-memory.dmp family_xenorat behavioral1/memory/2120-59-0x0000000005180000-0x000000000527A000-memory.dmp family_xenorat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2420 powershell.exe 2540 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 1656 Quote List.scr.exe 2120 Quote List.scr.exe -
Loads dropped DLL 3 IoCs
pid Process 2316 Quote List.scr.exe 2316 Quote List.scr.exe 1656 Quote List.scr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 2316 2236 Quote List.scr.exe 34 PID 1656 set thread context of 2120 1656 Quote List.scr.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote List.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote List.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote List.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote List.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2236 Quote List.scr.exe 2236 Quote List.scr.exe 2236 Quote List.scr.exe 2236 Quote List.scr.exe 2420 powershell.exe 1656 Quote List.scr.exe 1656 Quote List.scr.exe 2540 powershell.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe 2120 Quote List.scr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2236 Quote List.scr.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 1656 Quote List.scr.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2120 Quote List.scr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 Quote List.scr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2420 2236 Quote List.scr.exe 31 PID 2236 wrote to memory of 2420 2236 Quote List.scr.exe 31 PID 2236 wrote to memory of 2420 2236 Quote List.scr.exe 31 PID 2236 wrote to memory of 2420 2236 Quote List.scr.exe 31 PID 2236 wrote to memory of 1980 2236 Quote List.scr.exe 33 PID 2236 wrote to memory of 1980 2236 Quote List.scr.exe 33 PID 2236 wrote to memory of 1980 2236 Quote List.scr.exe 33 PID 2236 wrote to memory of 1980 2236 Quote List.scr.exe 33 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2236 wrote to memory of 2316 2236 Quote List.scr.exe 34 PID 2316 wrote to memory of 1656 2316 Quote List.scr.exe 35 PID 2316 wrote to memory of 1656 2316 Quote List.scr.exe 35 PID 2316 wrote to memory of 1656 2316 Quote List.scr.exe 35 PID 2316 wrote to memory of 1656 2316 Quote List.scr.exe 35 PID 1656 wrote to memory of 2540 1656 Quote List.scr.exe 36 PID 1656 wrote to memory of 2540 1656 Quote List.scr.exe 36 PID 1656 wrote to memory of 2540 1656 Quote List.scr.exe 36 PID 1656 wrote to memory of 2540 1656 Quote List.scr.exe 36 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37 PID 1656 wrote to memory of 2120 1656 Quote List.scr.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"2⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"C:\Users\Admin\AppData\Local\Temp\Quote List.scr.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Quote List.scr.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Quote List.scr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\XenoManager\Quote List.scr.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\Quote List.scr.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Quote List.scr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cca19f10307f135a0f5a9e38aa2a5a07
SHA100dd373edfc296819ff0a8763272e36e44722bcf
SHA2565bbf0c909e4b172c2ead935babccf269dbf2a01b885ad027f16a623f08539095
SHA5123a60a956861638ce5a00228c23cef304e12245680b1e370a5ac133b06744efea71878f6e378266691d03c0f79e0b400ce8064f568180cdd87d308d7b0ea46e57
-
Filesize
569KB
MD5dc2bce43a2b3398e375fdb600650a576
SHA1a6c6ccf9affa2095eb481950f036c00cd3c4e437
SHA256509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
SHA512e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0