Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
QuoteList.scr.exe
Resource
win7-20240729-en
General
-
Target
QuoteList.scr.exe
-
Size
569KB
-
MD5
dc2bce43a2b3398e375fdb600650a576
-
SHA1
a6c6ccf9affa2095eb481950f036c00cd3c4e437
-
SHA256
509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
-
SHA512
e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0
-
SSDEEP
12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg
Malware Config
Extracted
xenorat
66.63.168.142
Microsoft_nd8912d
-
delay
5
-
install_path
temp
-
port
4782
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 7 IoCs
resource yara_rule behavioral1/memory/2108-15-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2108-11-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2108-10-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2108-20-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2108-17-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2068-57-0x0000000000420000-0x000000000042C000-memory.dmp family_xenorat behavioral1/memory/2068-58-0x0000000005EA0000-0x0000000005F9A000-memory.dmp family_xenorat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2896 powershell.exe 2312 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 QuoteList.scr.exe 2068 QuoteList.scr.exe -
Loads dropped DLL 3 IoCs
pid Process 2108 QuoteList.scr.exe 2108 QuoteList.scr.exe 2884 QuoteList.scr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1956 set thread context of 2108 1956 QuoteList.scr.exe 33 PID 2884 set thread context of 2068 2884 QuoteList.scr.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QuoteList.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QuoteList.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QuoteList.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QuoteList.scr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1956 QuoteList.scr.exe 1956 QuoteList.scr.exe 2896 powershell.exe 2884 QuoteList.scr.exe 2884 QuoteList.scr.exe 2312 powershell.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe 2068 QuoteList.scr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1956 QuoteList.scr.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2884 QuoteList.scr.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2068 QuoteList.scr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2068 QuoteList.scr.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2896 1956 QuoteList.scr.exe 31 PID 1956 wrote to memory of 2896 1956 QuoteList.scr.exe 31 PID 1956 wrote to memory of 2896 1956 QuoteList.scr.exe 31 PID 1956 wrote to memory of 2896 1956 QuoteList.scr.exe 31 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 1956 wrote to memory of 2108 1956 QuoteList.scr.exe 33 PID 2108 wrote to memory of 2884 2108 QuoteList.scr.exe 34 PID 2108 wrote to memory of 2884 2108 QuoteList.scr.exe 34 PID 2108 wrote to memory of 2884 2108 QuoteList.scr.exe 34 PID 2108 wrote to memory of 2884 2108 QuoteList.scr.exe 34 PID 2884 wrote to memory of 2312 2884 QuoteList.scr.exe 35 PID 2884 wrote to memory of 2312 2884 QuoteList.scr.exe 35 PID 2884 wrote to memory of 2312 2884 QuoteList.scr.exe 35 PID 2884 wrote to memory of 2312 2884 QuoteList.scr.exe 35 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36 PID 2884 wrote to memory of 2068 2884 QuoteList.scr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\QuoteList.scr.exe"C:\Users\Admin\AppData\Local\Temp\QuoteList.scr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\QuoteList.scr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\QuoteList.scr.exe"C:\Users\Admin\AppData\Local\Temp\QuoteList.scr.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\QuoteList.scr.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\QuoteList.scr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\XenoManager\QuoteList.scr.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\XenoManager\QuoteList.scr.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\QuoteList.scr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fac9f9da21b2a2fa8ae8745f4906de54
SHA195b7a562cb8b973506a20e66643c628ff99026ba
SHA2563a55e5d7bd79038e2f262be90aa9f4d291abae9e533acb72f6e7b9b7aa690762
SHA512da8d46d0b6c32aecdaba9f7802523c6cd45d76e88fdded54ae28cbe68cbff311ad65b194c87c9b06eab5c4a986e8fbacbbe710381a5f2c88e9e15b79bc2e27ca
-
Filesize
569KB
MD5dc2bce43a2b3398e375fdb600650a576
SHA1a6c6ccf9affa2095eb481950f036c00cd3c4e437
SHA256509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
SHA512e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0