Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe
Resource
win7-20240903-en
General
-
Target
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe
-
Size
1.0MB
-
MD5
bb64bee2678c3ad97a8d1243f25f1020
-
SHA1
89a98429a22ddf320a87d1d48d09869858c4d9c7
-
SHA256
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581
-
SHA512
e9b49a3f54db702b325ba8c1480690cba32462446228523f9b2be069e71eef170c4c9ad7d6d0dc8df37a0423af8228e38d1bb84da713cc7873e0a8f50a6e9026
-
SSDEEP
24576:0NA3R5drX4GcPNYCgLplxEMJ7cPbLLnhyRWG+pkllQORg:V5/cPuRrxEM9CXN6WGmOi
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
60000
-
install_path
temp
-
port
1391
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1928-81-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1928-89-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1928-83-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 11 IoCs
pid Process 2616 shtuid.sfx.exe 2028 shtuid.exe 2124 gdbfxn.sfx.exe 932 gdbfxn.exe 2408 gdbfxn.exe 1928 gdbfxn.exe 2236 gdbfxn.exe 1636 gdbfxn.exe 1752 gdbfxn.exe 2316 gdbfxn.exe 992 gdbfxn.exe -
Loads dropped DLL 13 IoCs
pid Process 2724 cmd.exe 2616 shtuid.sfx.exe 2616 shtuid.sfx.exe 2616 shtuid.sfx.exe 1840 cmd.exe 2124 gdbfxn.sfx.exe 2124 gdbfxn.sfx.exe 2124 gdbfxn.sfx.exe 2124 gdbfxn.sfx.exe 2236 gdbfxn.exe 1636 gdbfxn.exe 1636 gdbfxn.exe 1636 gdbfxn.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 932 set thread context of 2408 932 gdbfxn.exe 39 PID 932 set thread context of 1928 932 gdbfxn.exe 40 PID 932 set thread context of 2236 932 gdbfxn.exe 41 PID 1636 set thread context of 1752 1636 gdbfxn.exe 43 PID 1636 set thread context of 2316 1636 gdbfxn.exe 44 PID 1636 set thread context of 992 1636 gdbfxn.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shtuid.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shtuid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2388 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 932 gdbfxn.exe Token: SeDebugPrivilege 1636 gdbfxn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2560 AcroRd32.exe 2560 AcroRd32.exe 2560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 2724 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 880 wrote to memory of 2724 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 880 wrote to memory of 2724 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 880 wrote to memory of 2724 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 880 wrote to memory of 2560 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 32 PID 880 wrote to memory of 2560 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 32 PID 880 wrote to memory of 2560 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 32 PID 880 wrote to memory of 2560 880 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 32 PID 2724 wrote to memory of 2616 2724 cmd.exe 33 PID 2724 wrote to memory of 2616 2724 cmd.exe 33 PID 2724 wrote to memory of 2616 2724 cmd.exe 33 PID 2724 wrote to memory of 2616 2724 cmd.exe 33 PID 2616 wrote to memory of 2028 2616 shtuid.sfx.exe 34 PID 2616 wrote to memory of 2028 2616 shtuid.sfx.exe 34 PID 2616 wrote to memory of 2028 2616 shtuid.sfx.exe 34 PID 2616 wrote to memory of 2028 2616 shtuid.sfx.exe 34 PID 2028 wrote to memory of 1840 2028 shtuid.exe 35 PID 2028 wrote to memory of 1840 2028 shtuid.exe 35 PID 2028 wrote to memory of 1840 2028 shtuid.exe 35 PID 2028 wrote to memory of 1840 2028 shtuid.exe 35 PID 1840 wrote to memory of 2124 1840 cmd.exe 37 PID 1840 wrote to memory of 2124 1840 cmd.exe 37 PID 1840 wrote to memory of 2124 1840 cmd.exe 37 PID 1840 wrote to memory of 2124 1840 cmd.exe 37 PID 2124 wrote to memory of 932 2124 gdbfxn.sfx.exe 38 PID 2124 wrote to memory of 932 2124 gdbfxn.sfx.exe 38 PID 2124 wrote to memory of 932 2124 gdbfxn.sfx.exe 38 PID 2124 wrote to memory of 932 2124 gdbfxn.sfx.exe 38 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 2408 932 gdbfxn.exe 39 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 1928 932 gdbfxn.exe 40 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 932 wrote to memory of 2236 932 gdbfxn.exe 41 PID 2236 wrote to memory of 1636 2236 gdbfxn.exe 42 PID 2236 wrote to memory of 1636 2236 gdbfxn.exe 42 PID 2236 wrote to memory of 1636 2236 gdbfxn.exe 42 PID 2236 wrote to memory of 1636 2236 gdbfxn.exe 42 PID 1636 wrote to memory of 1752 1636 gdbfxn.exe 43 PID 1636 wrote to memory of 1752 1636 gdbfxn.exe 43 PID 1636 wrote to memory of 1752 1636 gdbfxn.exe 43 PID 1636 wrote to memory of 1752 1636 gdbfxn.exe 43 PID 1636 wrote to memory of 1752 1636 gdbfxn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe"C:\Users\Admin\AppData\Local\Temp\2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sifhxtr.cmd" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\shtuid.sfx.exeshtuid.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pyjfoalepodtyadfdyehngfszalhmuiofxvflffugyRhvqxsdfHbgnmeU3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\shtuid.exe"C:\Users\Admin\AppData\Local\Temp\shtuid.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\gfgdf.bat" "5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\gdbfxn.sfx.exegdbfxn.sfx.exe -dC:\Users\Admin\AppData\Roaming -ptyuhngfszafupbodgeyhrntdesczopthnymkdesyRhvqxsdfHbgnmeL6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\gdbfxn.exe"C:\Users\Admin\AppData\Roaming\gdbfxn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
PID:2408
-
-
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "UpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE2F0.tmp" /F9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
-
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe"C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
PID:992
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pago20.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5fa0a0bc195062f035e0b7971ead10491
SHA1ca2d4bd456ccba9fceb3f2b9ffefeb59615e12c9
SHA2567a0e40d4c39eae8f7415cb44504e04c1baf41f57e797308f026409c7353ed03d
SHA512c5a47170ad1ec061b37fd8c0726998400b144decccee65b9225184425da047e7abe007e17197c8423a5d9331c751d7f7d0512fa48de3fecbca0a5989e5c42ae4
-
Filesize
18KB
MD5acf982e756017cd7e1f2e6391652442f
SHA184def5229cf1f85c91a730e3b221b40fb320c851
SHA256f043c184340ea5bf28f095374a1b85ea844e87573b77c6b01c077bd4d167f977
SHA5127f80503c65f272c64d27ee4b588316268953fd4e4909529904207a2a918ce05ddeb8e22951ded24ecf18851e44d2734c89704a573e3bc24f84ccd12136e82e65
-
Filesize
1KB
MD55261c036f1ca199ad1a69a6bab8f0ed3
SHA1b02f0d9141a904a1a629bfbe2694a1cd0c08d536
SHA256c8c9294cdc2d1191ae0eaefbe969061e204d5b5858656ee4514c7eccc121d66e
SHA512219dae74c2fadf774108efe2ba42587524a76150e5d118b21c9ebdf96c38a108fb90422838a65e61e4398bc164bf09a8c1fa8ad34db91a046301d2660aed2112
-
Filesize
3KB
MD54665df91637a4d71f104113c8e944dea
SHA11ea51aab42bfb76ccc5c9495f195ed2a4aff82c0
SHA25643f37565b77b41ff0e768ccf0b4e262f612d4e398951c1776139fb21352ffdd0
SHA51219ffea794e2e6753f9ef448852d3dc48ebe829e536bb9421212740ab0551c0a54d92d7dcb787ad167ef349aaab2728814b966c55a61ce1b2efe075278e3bafa7
-
Filesize
481KB
MD5160d9d47abc4052297a9261fd33bfd7f
SHA1e9d70901e7c9ea80a37275b0a877f4dda9a0ec80
SHA256690534b998cc62f7e17629fd27a217882d9503fa8d0ca6cc85b08349e7985961
SHA512bc585f9f563c33366a244495f701403daf7676e2ba15b3677364b1f0504546255e6fcd69c833a6007a02735d066080c68f74aa42ef458ac6c4f9e9c0728888d4
-
Filesize
18KB
MD55cf9fd93b1460af90b20555cd78cb019
SHA1439b87a47ac28e7549adca232b4e8737c220f215
SHA2566ec30dc4bdfac5002d135329096cc57ca8b8dfa09d1ee32548a77c87905d1c36
SHA5129ae4d176cf96dbfee1cc55562d060a85c93f23c76f45994001895c2f9734dcb748fbcdf98eca14afa731393343d8266947e1c2494169b6a610ebe3c5b6733c04
-
Filesize
622KB
MD57c1185d81f87bcedb2eb2060f6e43b39
SHA1cf1dad12725cb9d42be12b6ee79a492c5808ea2b
SHA256378521d47e91640b5eb6015a46bd4e07bdb4a823e7cf056ce5623bcb31e0568f
SHA5127fe26ef5056a6a90d2ae1f46b5300d6be8980c54ec35766dff38c1e4f16f24821c95d742a6ceb6512e6333329c8d4a6b3e3174732efcb8ecafb63aa1d7314576
-
Filesize
776KB
MD53b63a9e19434b6ad83825cb9d5d9fe45
SHA177db1260bf42aea137e9ce4fbb5ad77f06a44631
SHA256c4b4f4273ecfa0817bee21a3c1252795a8bcb4ea1d19fc019dcd4ab51c6ae95d
SHA51208ea176dd8a1a817ce2a38f837389e8a15474dded9459a17e23036200f0c254cef384c5d73751d624a036c1b3ba87c7bdb2819bd3a5a14f113e2031a0ebcb965
-
Filesize
252KB
MD595114ee4faf8ca38611e81d5e6395db0
SHA1e0a6b16b2a8357c2dc191e8a96dfd2c7cde216f3
SHA256e0a74972b31b4ebfc9e3b6e2d2330b6f726ffbe8b31f9057ba62d096516bb3fb
SHA512f26f8c2c709f8898950b280aafc636da8e301c8fb9794f04298b01c403e5fc22e65fdc6e38555b139437c298a7703a326147df2c9e3b0a933b98c8cacbdff225