Analysis
-
max time kernel
72s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-11-2024 18:55
Static task
static1
General
-
Target
Dropper_protected.exe
-
Size
5.7MB
-
MD5
95f9265e284dbccd509025fdc368cadd
-
SHA1
a63c64dfe79d97aba4056539e1ae9905d1cf518f
-
SHA256
dd1d0772b969998d05d329411a3dec9ec52b344df956749dc9998f48107487d0
-
SHA512
18e0d2e959285dcc8b96bcb3dcbedaf7a8e868fb705f9d941ad5914820f17fd4a4d1889a713d032ffa65fbc3365635f7407b616f86b206406d31bba2e0f03040
-
SSDEEP
98304:d4Ngr8BHpJCLdpkaPDE+7sP3Nh7GsOSa5NJcHjJmZLXuDQn9ebtmg2bhWpxBZMxN:dV8h4pkaPDE+Uj7G7pNJqEKKitF2VWLE
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x001f00000002aa82-9.dat family_xenorat behavioral1/memory/2720-26-0x0000000000B00000-0x0000000000B12000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 2 IoCs
pid Process 2720 hahaha.exe 3948 SimpleCrackMe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3020 Dropper_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dropper_protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hahaha.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2212 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 Dropper_protected.exe 3020 Dropper_protected.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2212 vlc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe 2212 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 Dropper_protected.exe 3020 Dropper_protected.exe 2212 vlc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2720 3020 Dropper_protected.exe 82 PID 3020 wrote to memory of 2720 3020 Dropper_protected.exe 82 PID 3020 wrote to memory of 2720 3020 Dropper_protected.exe 82 PID 3020 wrote to memory of 3948 3020 Dropper_protected.exe 83 PID 3020 wrote to memory of 3948 3020 Dropper_protected.exe 83 PID 3948 wrote to memory of 1160 3948 SimpleCrackMe.exe 86 PID 3948 wrote to memory of 1160 3948 SimpleCrackMe.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dropper_protected.exe"C:\Users\Admin\AppData\Local\Temp\Dropper_protected.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\hahaha.exe"C:\Users\Admin\AppData\Local\Temp\hahaha.exe" 02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\SimpleCrackMe.exe"C:\Users\Admin\AppData\Local\Temp\SimpleCrackMe.exe" 02⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c exit3⤵PID:1160
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RegisterInstall.TS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2212
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RegisterInstall.TS"1⤵PID:2852
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RegisterInstall.TS"1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5a2e2bddf8addd8d7852b1fd57fdc30ae
SHA1df84efd4116b4af71721330c5a7abc0b2f36548b
SHA25655e05a99b673b02723a8861acb4a0c1ad7488ff498570b76e67e69d20fc284a0
SHA51287b5e0bbc5f7d4ae5f69fe43fa23349016a73dbd7eac3675a7f338d7fa5ff2c20a42bdc88fe5172f50a383b23d18278b40f79ad1af269689b56b23cbf78ef96d
-
Filesize
45KB
MD542faf67435979c1245010683d8e916b5
SHA1b93b780736398c6e4001c150276ccb24982ed67f
SHA256eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd
SHA512ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86