Analysis
-
max time kernel
292s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.exe
Resource
win7-20240903-en
General
-
Target
Transferencia.exe
-
Size
712KB
-
MD5
205f93678f0207a93801654d71ddb792
-
SHA1
4f5aa1639d9c85d93060ebecd17fbe7f0fef313c
-
SHA256
3138fbe3448390de473a313644fd2a205e7e08de043d5097b37db857c40bfad0
-
SHA512
0784187f0c40f1d428c3b982797f95c29485c43b8197ecaff305f926994222bc7e1f7de4f98205376a86f81676485c232f8732c1e756d159a5bf74d13f1f5a20
-
SSDEEP
12288:JcrNS33L10QdrX4FBojL8DPNYnyV1Rotvwd2CO078/iY7Qlz9Rq/CvrvU:0NA3R5drX4GcPNYyr2voO078/iQI9RqN
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
50000
-
install_path
appdata
-
port
1391
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/5036-33-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Transferencia.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation fyudhid.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation fyudhid.exe -
Executes dropped EXE 7 IoCs
pid Process 1672 fyudhid.sfx.exe 1484 fyudhid.exe 5036 fyudhid.exe 1456 fyudhid.exe 2744 fyudhid.exe 3400 fyudhid.exe 264 fyudhid.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1484 set thread context of 5036 1484 fyudhid.exe 93 PID 1484 set thread context of 1456 1484 fyudhid.exe 94 PID 2744 set thread context of 3400 2744 fyudhid.exe 96 PID 2744 set thread context of 264 2744 fyudhid.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2372 264 WerFault.exe 97 3008 3400 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyudhid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyudhid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyudhid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Transferencia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyudhid.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyudhid.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings Transferencia.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 244 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 312 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1484 fyudhid.exe Token: SeDebugPrivilege 2744 fyudhid.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1288 4668 Transferencia.exe 87 PID 4668 wrote to memory of 1288 4668 Transferencia.exe 87 PID 4668 wrote to memory of 1288 4668 Transferencia.exe 87 PID 4668 wrote to memory of 244 4668 Transferencia.exe 90 PID 4668 wrote to memory of 244 4668 Transferencia.exe 90 PID 4668 wrote to memory of 244 4668 Transferencia.exe 90 PID 1288 wrote to memory of 1672 1288 cmd.exe 91 PID 1288 wrote to memory of 1672 1288 cmd.exe 91 PID 1288 wrote to memory of 1672 1288 cmd.exe 91 PID 1672 wrote to memory of 1484 1672 fyudhid.sfx.exe 92 PID 1672 wrote to memory of 1484 1672 fyudhid.sfx.exe 92 PID 1672 wrote to memory of 1484 1672 fyudhid.sfx.exe 92 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 5036 1484 fyudhid.exe 93 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 1484 wrote to memory of 1456 1484 fyudhid.exe 94 PID 5036 wrote to memory of 2744 5036 fyudhid.exe 95 PID 5036 wrote to memory of 2744 5036 fyudhid.exe 95 PID 5036 wrote to memory of 2744 5036 fyudhid.exe 95 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 3400 2744 fyudhid.exe 96 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 2744 wrote to memory of 264 2744 fyudhid.exe 97 PID 1456 wrote to memory of 312 1456 fyudhid.exe 120 PID 1456 wrote to memory of 312 1456 fyudhid.exe 120 PID 1456 wrote to memory of 312 1456 fyudhid.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\fyudhid.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\fyudhid.sfx.exefyudhid.sfx.exe -dC:\Users\Admin\AppData\Roaming -pbotadelifsujhmgtpswngjMitredfdtixgtoqxqegujhtfeswczafugybsbBbsdhdqbqeku3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\fyudhid.exe"C:\Users\Admin\AppData\Roaming\fyudhid.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\fyudhid.exeC:\Users\Admin\AppData\Roaming\fyudhid.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exe"C:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exeC:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exe7⤵
- Executes dropped EXE
PID:3400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 808⤵
- Program crash
PID:3008
-
-
-
C:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exeC:\Users\Admin\AppData\Roaming\UpdateManager\fyudhid.exe7⤵
- Executes dropped EXE
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 808⤵
- Program crash
PID:2372
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\fyudhid.exeC:\Users\Admin\AppData\Roaming\fyudhid.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "UpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FF9.tmp" /F6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:312
-
-
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\paymt_dates.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3400 -ip 34001⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 264 -ip 2641⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD5b3936111cd0f3541ff0a5b1b98ab97b8
SHA193e7aac1d64cdbf0bd35b5b29e768a7be8f7a1c7
SHA256e5589df5ada28fb330ce75e847e93b60ef4ba90003001c6cb7915fc1309a52d9
SHA512bb88bb21cc7d335f9905f236e0b96ba8b0e9fed8427ef94d8d405b09b616836b169f23302a17ecda163bcb2a2383e9fcc91abcc2f9e0ad66b20a374b676b59bf
-
Filesize
16KB
MD592d61c851d77c26075f502b5683659cf
SHA16aa42164e0aa6ab877471f9dc9e9989435bfe272
SHA25640c853fbdadf9cbe18c8bdab9c82f8b08c74f6471e0ed3872e3638770cd1ad1d
SHA512b5690ba5f1095a5f25bc3b4dff739736bafbbd4c91bf8d833aefb3293e8c3d31085383150d841e7645e95eb361959e1bf2b3d85698d2b565b83018e4e80763fc
-
Filesize
248KB
MD5fc52857470de4fba6092850903ac717b
SHA131a6cca56275235ede3c119e71179ade5f2e6920
SHA256f7f878630e1d923f29845b0462d6449602457080a5b7ce7099db207598a3bec1
SHA512c4c34e3e59fddc2305faa224f6d6349c66245e87e104f65885072aec780b8c18f62021cbb158c679bb0963d7b5c7c25a2194747f398df27b473b608012e2a2b3
-
Filesize
477KB
MD5be09bfaf5845333ecbacdd6af8d35e03
SHA1a1a6e588c3e44304604c9277f91f3bb562933c0e
SHA256a10a3a94a9c0ed8bb2772c93a57d243ff6be9911aeaaaf03909f443226f6a64d
SHA5123d9aa17b6fd84bd8c7791249d2734b9ad7858c1adf5d7db795ceda2627db1dc15b71d65bea55373881c8796125c8f22902250f62b360e661fa3f966edfab2b3f
-
Filesize
24B
MD51f2dbffd7ff7d7d6dcbc424beda05107
SHA18d24f2aac5f1cb33b6c04d5a38257353f7f5bd86
SHA25632497ecb378cdeb6844225e78c8b7297d9ae2553b3bd01483ce043177ccbad58
SHA512018e645d4d46969a40e67342feba0b38c5af698d8ac25f2a38eb6af290f77f866cda1dad8d431a6eecc719dfe95af2b86a5db2eeab46593135a49b47902bf6a9