Analysis

  • max time kernel
    95s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 21:35

General

  • Target

    617bce7ff2b080b7839d8b1a99eebe44e25834902c106c237c0a36264a14f41c.exe

  • Size

    230KB

  • MD5

    975e9b53538e129219e9c4ffd6ef4167

  • SHA1

    3fb4f3517d7004cf4696334aa116003765a715b3

  • SHA256

    617bce7ff2b080b7839d8b1a99eebe44e25834902c106c237c0a36264a14f41c

  • SHA512

    f29d5497ffb0a5fa0ea15d85b4f96e40aa527319aa812f9be2e44a5e058f36a1e2621e09445ebc72a00ec440ebae6579accb12d5fd09e7f1f843f03863f704d5

  • SSDEEP

    6144:B0rsn91Wi08wIeSr1OpgIaIbIZFtHhlD1b+h49YONnx+Qrvm:BZ91Wi08MpgMEqh49YONnx+Qrvm

Malware Config

Extracted

Family

xehook

Version

2.1.5 Stable

C2

https://t.me/+w897k5UK_jIyNDgy

Attributes
  • id

    208

  • token

    xehook208585951630880

Signatures

  • Xehook stealer

    Xehook is an infostealer written in C#.

  • Loads dropped DLL 1 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\617bce7ff2b080b7839d8b1a99eebe44e25834902c106c237c0a36264a14f41c.exe
    "C:\Users\Admin\AppData\Local\Temp\617bce7ff2b080b7839d8b1a99eebe44e25834902c106c237c0a36264a14f41c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    349KB

    MD5

    04f4aeb958d201d5decc4a71d6dc530e

    SHA1

    559cfbf06e715264a25e75e3c52c26ac25556f35

    SHA256

    7bec3f52cdd477d3823619e315b144ab55614285e10ae15061833f589e0e2378

    SHA512

    d2c2aba810e7f0f97b8e4db71869edb1513e9bae0388115d2f7a57b0dc4683939efa04a3e7449ab18179c1e9a253c792956d41f41404e7fa985227f3b76cdf71

  • memory/2304-13-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/2304-1-0x00000000001F0000-0x0000000000234000-memory.dmp

    Filesize

    272KB

  • memory/2304-2-0x0000000000D70000-0x0000000000D76000-memory.dmp

    Filesize

    24KB

  • memory/2304-9-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/2304-0-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

    Filesize

    4KB

  • memory/2304-10-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/4496-14-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/4496-11-0x0000000000580000-0x00000000005AC000-memory.dmp

    Filesize

    176KB

  • memory/4496-15-0x0000000004F20000-0x00000000054C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4496-16-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/4496-17-0x0000000005C60000-0x0000000005CF2000-memory.dmp

    Filesize

    584KB

  • memory/4496-18-0x0000000005AE0000-0x0000000005B46000-memory.dmp

    Filesize

    408KB

  • memory/4496-19-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/4496-20-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/4496-22-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB