Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe
Resource
win7-20240708-en
General
-
Target
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe
-
Size
1.0MB
-
MD5
bb64bee2678c3ad97a8d1243f25f1020
-
SHA1
89a98429a22ddf320a87d1d48d09869858c4d9c7
-
SHA256
2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581
-
SHA512
e9b49a3f54db702b325ba8c1480690cba32462446228523f9b2be069e71eef170c4c9ad7d6d0dc8df37a0423af8228e38d1bb84da713cc7873e0a8f50a6e9026
-
SSDEEP
24576:0NA3R5drX4GcPNYCgLplxEMJ7cPbLLnhyRWG+pkllQORg:V5/cPuRrxEM9CXN6WGmOi
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
60000
-
install_path
temp
-
port
1391
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1652-83-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1652-81-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/1652-79-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 11 IoCs
pid Process 2800 shtuid.sfx.exe 2024 shtuid.exe 1672 gdbfxn.sfx.exe 2224 gdbfxn.exe 1652 gdbfxn.exe 2964 gdbfxn.exe 1212 gdbfxn.exe 2488 gdbfxn.exe 572 gdbfxn.exe 2164 gdbfxn.exe 1876 gdbfxn.exe -
Loads dropped DLL 13 IoCs
pid Process 2744 cmd.exe 2800 shtuid.sfx.exe 2800 shtuid.sfx.exe 2800 shtuid.sfx.exe 1344 cmd.exe 1672 gdbfxn.sfx.exe 1672 gdbfxn.sfx.exe 1672 gdbfxn.sfx.exe 1672 gdbfxn.sfx.exe 2964 gdbfxn.exe 2488 gdbfxn.exe 2488 gdbfxn.exe 2488 gdbfxn.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2224 set thread context of 1652 2224 gdbfxn.exe 39 PID 2224 set thread context of 2964 2224 gdbfxn.exe 40 PID 2224 set thread context of 1212 2224 gdbfxn.exe 41 PID 2488 set thread context of 572 2488 gdbfxn.exe 43 PID 2488 set thread context of 2164 2488 gdbfxn.exe 44 PID 2488 set thread context of 1876 2488 gdbfxn.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shtuid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shtuid.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbfxn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2224 gdbfxn.exe Token: SeDebugPrivilege 2488 gdbfxn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2744 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 2368 wrote to memory of 2744 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 2368 wrote to memory of 2744 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 2368 wrote to memory of 2744 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 30 PID 2368 wrote to memory of 2808 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 31 PID 2368 wrote to memory of 2808 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 31 PID 2368 wrote to memory of 2808 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 31 PID 2368 wrote to memory of 2808 2368 2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe 31 PID 2744 wrote to memory of 2800 2744 cmd.exe 33 PID 2744 wrote to memory of 2800 2744 cmd.exe 33 PID 2744 wrote to memory of 2800 2744 cmd.exe 33 PID 2744 wrote to memory of 2800 2744 cmd.exe 33 PID 2800 wrote to memory of 2024 2800 shtuid.sfx.exe 34 PID 2800 wrote to memory of 2024 2800 shtuid.sfx.exe 34 PID 2800 wrote to memory of 2024 2800 shtuid.sfx.exe 34 PID 2800 wrote to memory of 2024 2800 shtuid.sfx.exe 34 PID 2024 wrote to memory of 1344 2024 shtuid.exe 35 PID 2024 wrote to memory of 1344 2024 shtuid.exe 35 PID 2024 wrote to memory of 1344 2024 shtuid.exe 35 PID 2024 wrote to memory of 1344 2024 shtuid.exe 35 PID 1344 wrote to memory of 1672 1344 cmd.exe 37 PID 1344 wrote to memory of 1672 1344 cmd.exe 37 PID 1344 wrote to memory of 1672 1344 cmd.exe 37 PID 1344 wrote to memory of 1672 1344 cmd.exe 37 PID 1672 wrote to memory of 2224 1672 gdbfxn.sfx.exe 38 PID 1672 wrote to memory of 2224 1672 gdbfxn.sfx.exe 38 PID 1672 wrote to memory of 2224 1672 gdbfxn.sfx.exe 38 PID 1672 wrote to memory of 2224 1672 gdbfxn.sfx.exe 38 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 1652 2224 gdbfxn.exe 39 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 2964 2224 gdbfxn.exe 40 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2224 wrote to memory of 1212 2224 gdbfxn.exe 41 PID 2964 wrote to memory of 2488 2964 gdbfxn.exe 42 PID 2964 wrote to memory of 2488 2964 gdbfxn.exe 42 PID 2964 wrote to memory of 2488 2964 gdbfxn.exe 42 PID 2964 wrote to memory of 2488 2964 gdbfxn.exe 42 PID 2488 wrote to memory of 572 2488 gdbfxn.exe 43 PID 2488 wrote to memory of 572 2488 gdbfxn.exe 43 PID 2488 wrote to memory of 572 2488 gdbfxn.exe 43 PID 2488 wrote to memory of 572 2488 gdbfxn.exe 43 PID 2488 wrote to memory of 572 2488 gdbfxn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe"C:\Users\Admin\AppData\Local\Temp\2b36ac84fcaf5b888f8ed974369a858d9dd5e3ca2e7ff3be4e0ac697c7177581N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sifhxtr.cmd" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\shtuid.sfx.exeshtuid.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pyjfoalepodtyadfdyehngfszalhmuiofxvflffugyRhvqxsdfHbgnmeU3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\shtuid.exe"C:\Users\Admin\AppData\Local\Temp\shtuid.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\gfgdf.bat" "5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\gdbfxn.sfx.exegdbfxn.sfx.exe -dC:\Users\Admin\AppData\Roaming -ptyuhngfszafupbodgeyhrntdesczopthnymkdesyRhvqxsdfHbgnmeL6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\gdbfxn.exe"C:\Users\Admin\AppData\Roaming\gdbfxn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe"C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\gdbfxn.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
-
C:\Users\Admin\AppData\Roaming\gdbfxn.exeC:\Users\Admin\AppData\Roaming\gdbfxn.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "UpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA506.tmp" /F9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pago20.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5fa0a0bc195062f035e0b7971ead10491
SHA1ca2d4bd456ccba9fceb3f2b9ffefeb59615e12c9
SHA2567a0e40d4c39eae8f7415cb44504e04c1baf41f57e797308f026409c7353ed03d
SHA512c5a47170ad1ec061b37fd8c0726998400b144decccee65b9225184425da047e7abe007e17197c8423a5d9331c751d7f7d0512fa48de3fecbca0a5989e5c42ae4
-
Filesize
776KB
MD53b63a9e19434b6ad83825cb9d5d9fe45
SHA177db1260bf42aea137e9ce4fbb5ad77f06a44631
SHA256c4b4f4273ecfa0817bee21a3c1252795a8bcb4ea1d19fc019dcd4ab51c6ae95d
SHA51208ea176dd8a1a817ce2a38f837389e8a15474dded9459a17e23036200f0c254cef384c5d73751d624a036c1b3ba87c7bdb2819bd3a5a14f113e2031a0ebcb965
-
Filesize
18KB
MD5acf982e756017cd7e1f2e6391652442f
SHA184def5229cf1f85c91a730e3b221b40fb320c851
SHA256f043c184340ea5bf28f095374a1b85ea844e87573b77c6b01c077bd4d167f977
SHA5127f80503c65f272c64d27ee4b588316268953fd4e4909529904207a2a918ce05ddeb8e22951ded24ecf18851e44d2734c89704a573e3bc24f84ccd12136e82e65
-
Filesize
1KB
MD55261c036f1ca199ad1a69a6bab8f0ed3
SHA1b02f0d9141a904a1a629bfbe2694a1cd0c08d536
SHA256c8c9294cdc2d1191ae0eaefbe969061e204d5b5858656ee4514c7eccc121d66e
SHA512219dae74c2fadf774108efe2ba42587524a76150e5d118b21c9ebdf96c38a108fb90422838a65e61e4398bc164bf09a8c1fa8ad34db91a046301d2660aed2112
-
Filesize
3KB
MD5f687bd0bed7f9cd9efd6c7e0fe71cce8
SHA1a85b412c43f07499f60e9f70955cb21d5bc3db31
SHA2563a25b06202ab4553ada7387724ff8a2bd96b18f846313cbb07d8ff8e02083c8b
SHA512e62683fad5a2683c4f0ca679fc31e96efa41954023d8f33689ca22bb8fd5f2544cf8a93c6d269a9c7559e507da52c2cb9b79acd75e6a4f2cdd95e457de7a945f
-
Filesize
481KB
MD5160d9d47abc4052297a9261fd33bfd7f
SHA1e9d70901e7c9ea80a37275b0a877f4dda9a0ec80
SHA256690534b998cc62f7e17629fd27a217882d9503fa8d0ca6cc85b08349e7985961
SHA512bc585f9f563c33366a244495f701403daf7676e2ba15b3677364b1f0504546255e6fcd69c833a6007a02735d066080c68f74aa42ef458ac6c4f9e9c0728888d4
-
Filesize
18KB
MD55cf9fd93b1460af90b20555cd78cb019
SHA1439b87a47ac28e7549adca232b4e8737c220f215
SHA2566ec30dc4bdfac5002d135329096cc57ca8b8dfa09d1ee32548a77c87905d1c36
SHA5129ae4d176cf96dbfee1cc55562d060a85c93f23c76f45994001895c2f9734dcb748fbcdf98eca14afa731393343d8266947e1c2494169b6a610ebe3c5b6733c04
-
Filesize
622KB
MD57c1185d81f87bcedb2eb2060f6e43b39
SHA1cf1dad12725cb9d42be12b6ee79a492c5808ea2b
SHA256378521d47e91640b5eb6015a46bd4e07bdb4a823e7cf056ce5623bcb31e0568f
SHA5127fe26ef5056a6a90d2ae1f46b5300d6be8980c54ec35766dff38c1e4f16f24821c95d742a6ceb6512e6333329c8d4a6b3e3174732efcb8ecafb63aa1d7314576
-
Filesize
252KB
MD595114ee4faf8ca38611e81d5e6395db0
SHA1e0a6b16b2a8357c2dc191e8a96dfd2c7cde216f3
SHA256e0a74972b31b4ebfc9e3b6e2d2330b6f726ffbe8b31f9057ba62d096516bb3fb
SHA512f26f8c2c709f8898950b280aafc636da8e301c8fb9794f04298b01c403e5fc22e65fdc6e38555b139437c298a7703a326147df2c9e3b0a933b98c8cacbdff225