Analysis
-
max time kernel
102s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe
Resource
win7-20240903-en
General
-
Target
86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe
-
Size
137KB
-
MD5
7c1376ee97291445f7a9ad3645ef4100
-
SHA1
101ed30c8f284886227c2fef18df87136e515f86
-
SHA256
86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6
-
SHA512
5a0dfebc8b0f2d56a88c4a7718e7fe9b446638f145b2990a0edbe70dfee03154098cc399d3c2a6e664a758bc1f1dfee9c440650cc41d9f9348c5c33e21238cbd
-
SSDEEP
3072:7v17hMz+Q2eKaRA3Rv4MuM3lGsSTwsST9Y7rkq7/Hm:57Sz+QhKaRA3Rv4Mu2lrSTBST9Y7rkYu
Malware Config
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000021647-4.dat family_xenorat -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\reconstructed.exe" 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe -
Xenorat family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reconstructed.exe 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reconstructed.exe 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\reconstructed.exe" 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe"C:\Users\Admin\AppData\Local\Temp\86950835ce30b33e5b538f46915860717379a78fcfe6439974fcb6d127a6dea6N.exe"1⤵
- Windows security bypass
- Drops startup file
- Windows security modification
- System Location Discovery: System Language Discovery
PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD542faf67435979c1245010683d8e916b5
SHA1b93b780736398c6e4001c150276ccb24982ed67f
SHA256eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd
SHA512ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86