Analysis
-
max time kernel
1793s -
max time network
1132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 07:15
General
-
Target
bootstrapper.exe
-
Size
45KB
-
MD5
e81a0f3b4984dec8536b391263fa387d
-
SHA1
e93a4e6c2c1deed94da6fccfd0500c71f4a8fab0
-
SHA256
7c6128c14c5b288d416ac1bf21867189707461a9e2fa7751242c4442a60fbc26
-
SHA512
888f75ac223a4f31e152d6943fa4030789cdb3a5d75ef529d3541ec6d109afdae8fbfc5434e3afae9c59db9b6616caae83c09b996546153d4ae3591eb5f7520b
-
SSDEEP
768:hdhO/poiiUcjlJIngtUH9Xqk5nWEZ5SbTDacWI7CPW55:fw+jjgnuUH9XqcnW85SbT1WIB
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
Client
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/2192-1-0x00000000001A0000-0x00000000001B2000-memory.dmp family_xenorat behavioral1/files/0x00090000000234c0-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation bootstrapper.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 bootstrapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2496 2192 bootstrapper.exe 82 PID 2192 wrote to memory of 2496 2192 bootstrapper.exe 82 PID 2192 wrote to memory of 2496 2192 bootstrapper.exe 82 PID 2496 wrote to memory of 320 2496 bootstrapper.exe 83 PID 2496 wrote to memory of 320 2496 bootstrapper.exe 83 PID 2496 wrote to memory of 320 2496 bootstrapper.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\bootstrapper.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Client" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDF83.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5e81a0f3b4984dec8536b391263fa387d
SHA1e93a4e6c2c1deed94da6fccfd0500c71f4a8fab0
SHA2567c6128c14c5b288d416ac1bf21867189707461a9e2fa7751242c4442a60fbc26
SHA512888f75ac223a4f31e152d6943fa4030789cdb3a5d75ef529d3541ec6d109afdae8fbfc5434e3afae9c59db9b6616caae83c09b996546153d4ae3591eb5f7520b
-
Filesize
1KB
MD57bb57db424cbf91948e17070a468c113
SHA127137c051392435f29e45d73784505fbc8733c44
SHA256337964d700d144271eb7bf73f8e17e4ea0fbd7fa07f984a5af8774541ffbc637
SHA512230cb14b0c6bdcb03857c76ea69bf2f7e394879cebf984f54a4c96b68ef452ade22f9d5d1a52b683b717816f34ea05d219348460616ae213a6fcfe64017c86b2