Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 11:42
Behavioral task
behavioral1
Sample
SleezyPermSpoofer.exe
Resource
win7-20240903-en
General
-
Target
SleezyPermSpoofer.exe
-
Size
78KB
-
MD5
7628121165d4796f1ead2df63225b7e2
-
SHA1
56e0300ef52e9ef736d266a07cabf9b5bdee3c3e
-
SHA256
a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
-
SHA512
fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
SSDEEP
1536:QNo/jOtwwm0ZvHTPkorpS/WEQ55HL6VG28SPCYbxfE:QRm09dP5HLfSKYbxfE
Malware Config
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/5104-1-0x0000000000A10000-0x0000000000A2A000-memory.dmp family_xenorat behavioral2/files/0x0009000000023452-7.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation SleezyPermSpoofer.exe -
Executes dropped EXE 1 IoCs
pid Process 932 SleezyPermSpoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 20 4.tcp.eu.ngrok.io 43 4.tcp.eu.ngrok.io 49 4.tcp.eu.ngrok.io 56 4.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SleezyPermSpoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SleezyPermSpoofer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5104 wrote to memory of 932 5104 SleezyPermSpoofer.exe 84 PID 5104 wrote to memory of 932 5104 SleezyPermSpoofer.exe 84 PID 5104 wrote to memory of 932 5104 SleezyPermSpoofer.exe 84 PID 932 wrote to memory of 2300 932 SleezyPermSpoofer.exe 85 PID 932 wrote to memory of 2300 932 SleezyPermSpoofer.exe 85 PID 932 wrote to memory of 2300 932 SleezyPermSpoofer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SleezyPermSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SleezyPermSpoofer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\SleezyPermSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\SleezyPermSpoofer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp756E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
78KB
MD57628121165d4796f1ead2df63225b7e2
SHA156e0300ef52e9ef736d266a07cabf9b5bdee3c3e
SHA256a10ceb030849738fb5c0c2b03b63428979b2f14047cbf1501fa7ff626f0e30a1
SHA512fe9808eb871ed5ac7a08be5ec19532ddd2148c3ad4b179b7e51a378bc6ad656f5d0aafaed3837f6f0b9ef7fc361ccd8e3937cc1a4e8a33e2220fe81b8f20f0f8
-
Filesize
1KB
MD545e8b9ea784ced7385b4ab4a0ea3b7ac
SHA17e01a595f8ecccea6dd01e53a7f55f7d15db0328
SHA2564a002bb151e2a2be15c2d73f43ef2571362c47b56228c2be0b8d25f9fd9eaa4b
SHA512d3458f5d0a975bc5cefde991db439b4db00dba8907a7b28ac4cf8b7912d1927032ffcf83b0ca6228bc731391c50f1dcc8ea2e1b39005ae0f1c6b9bb69b925403