Analysis
-
max time kernel
43s -
max time network
33s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01-11-2024 20:27
General
-
Target
Spieker.cheat.exe
-
Size
45KB
-
MD5
42faf67435979c1245010683d8e916b5
-
SHA1
b93b780736398c6e4001c150276ccb24982ed67f
-
SHA256
eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd
-
SHA512
ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86
-
SSDEEP
768:RdhO/poiiUcjlJInvvH9Xqk5nWEZ5SbTDaJWI7CPW5R:Pw+jjgn3H9XqcnW85SbTAWIJ
Malware Config
Extracted
Family
xenorat
C2
127.0.0.1
Mutex
Xeno_rat_nd8912d
Attributes
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/3968-1-0x0000000000A70000-0x0000000000A82000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spieker.cheat.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1876 taskmgr.exe Token: SeSystemProfilePrivilege 1876 taskmgr.exe Token: SeCreateGlobalPrivilege 1876 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe 1876 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spieker.cheat.exe"C:\Users\Admin\AppData\Local\Temp\Spieker.cheat.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3968
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1876