Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 11:42
Behavioral task
behavioral1
Sample
SleezyPermSpoofer.exe
Resource
win7-20240903-en
General
-
Target
SleezyPermSpoofer.exe
-
Size
78KB
-
MD5
7628121165d4796f1ead2df63225b7e2
-
SHA1
56e0300ef52e9ef736d266a07cabf9b5bdee3c3e
-
SHA256
a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
-
SHA512
fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
SSDEEP
1536:QNo/jOtwwm0ZvHTPkorpS/WEQ55HL6VG28SPCYbxfE:QRm09dP5HLfSKYbxfE
Malware Config
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2248-1-0x0000000000980000-0x000000000099A000-memory.dmp family_xenorat behavioral1/files/0x0008000000015dac-8.dat family_xenorat behavioral1/memory/2796-10-0x00000000012C0000-0x00000000012DA000-memory.dmp family_xenorat -
Executes dropped EXE 1 IoCs
pid Process 2796 SleezyPermSpoofer.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 SleezyPermSpoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 4.tcp.eu.ngrok.io 5 4.tcp.eu.ngrok.io 12 4.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SleezyPermSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SleezyPermSpoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2796 2248 SleezyPermSpoofer.exe 30 PID 2248 wrote to memory of 2796 2248 SleezyPermSpoofer.exe 30 PID 2248 wrote to memory of 2796 2248 SleezyPermSpoofer.exe 30 PID 2248 wrote to memory of 2796 2248 SleezyPermSpoofer.exe 30 PID 2796 wrote to memory of 2204 2796 SleezyPermSpoofer.exe 31 PID 2796 wrote to memory of 2204 2796 SleezyPermSpoofer.exe 31 PID 2796 wrote to memory of 2204 2796 SleezyPermSpoofer.exe 31 PID 2796 wrote to memory of 2204 2796 SleezyPermSpoofer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SleezyPermSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SleezyPermSpoofer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\SleezyPermSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\SleezyPermSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1027.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57628121165d4796f1ead2df63225b7e2
SHA156e0300ef52e9ef736d266a07cabf9b5bdee3c3e
SHA256a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
SHA512fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
Filesize
1KB
MD545e8b9ea784ced7385b4ab4a0ea3b7ac
SHA17e01a595f8ecccea6dd01e53a7f55f7d15db0328
SHA2564a002bb151e2a2be15c2d73f43ef2571362c47b56228c2be0b8d25f9fd9eaa4b
SHA512d3458f5d0a975bc5cefde991db439b4db00dba8907a7b28ac4cf8b7912d1927032ffcf83b0ca6228bc731391c50f1dcc8ea2e1b39005ae0f1c6b9bb69b925403