Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:42
Behavioral task
behavioral1
Sample
933EB414285EA29140928E633E8EC34E.exe
Resource
win7-20241010-en
General
-
Target
933EB414285EA29140928E633E8EC34E.exe
-
Size
45KB
-
MD5
933eb414285ea29140928e633e8ec34e
-
SHA1
228a81ed40af52d0d4f7740401440c2d9a8e496d
-
SHA256
4079c8b353cbed438c29fe62ff7315fea2a90ff3cc16055801939f647d2f2d26
-
SHA512
71fc1a046d3b60dd91ee6d6bd4d9d433d5361f02d781a56b9677ba02748497c0284288dc128cce24438bc22ab3fc6256882744ac63a35061cf692d8aec088868
-
SSDEEP
768:wdhO/poiiUcjlJIn4hYH9Xqk5nWEZ5SbTDaEbuI7CPW5W:iw+jjgn4SH9XqcnW85SbThbuIe
Malware Config
Extracted
xenorat
194.113.106.81
szczur_nd8912d
-
delay
5000
-
install_path
appdata
-
port
2271
-
startup_name
Java Update
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4964-1-0x0000000000900000-0x0000000000912000-memory.dmp family_xenorat behavioral2/files/0x0008000000023cca-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 933EB414285EA29140928E633E8EC34E.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 933EB414285EA29140928E633E8EC34E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 933EB414285EA29140928E633E8EC34E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 933EB414285EA29140928E633E8EC34E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe 2984 933EB414285EA29140928E633E8EC34E.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 933EB414285EA29140928E633E8EC34E.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2984 4964 933EB414285EA29140928E633E8EC34E.exe 85 PID 4964 wrote to memory of 2984 4964 933EB414285EA29140928E633E8EC34E.exe 85 PID 4964 wrote to memory of 2984 4964 933EB414285EA29140928E633E8EC34E.exe 85 PID 2984 wrote to memory of 2648 2984 933EB414285EA29140928E633E8EC34E.exe 88 PID 2984 wrote to memory of 2648 2984 933EB414285EA29140928E633E8EC34E.exe 88 PID 2984 wrote to memory of 2648 2984 933EB414285EA29140928E633E8EC34E.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\933EB414285EA29140928E633E8EC34E.exe"C:\Users\Admin\AppData\Local\Temp\933EB414285EA29140928E633E8EC34E.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\XenoManager\933EB414285EA29140928E633E8EC34E.exe"C:\Users\Admin\AppData\Roaming\XenoManager\933EB414285EA29140928E633E8EC34E.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Java Update" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD91A.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\933EB414285EA29140928E633E8EC34E.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5ab6bc79e2c2840c102a00c01822b04b6
SHA19c4e092173e237c0d84fd8745e359b97d8272f79
SHA2565eac7637fd0d1c47bb4318264e0db3315ddd1f44bf1edf16ea964e669e26229a
SHA512ceb98181ad115baf67964e933a04894ededf224cab61166503bfa12786d87a1f8878f10aa5d9cf8ce662a0b1fc9adfd341f59e162bef7c684edf51c131d1f631
-
Filesize
45KB
MD5933eb414285ea29140928e633e8ec34e
SHA1228a81ed40af52d0d4f7740401440c2d9a8e496d
SHA2564079c8b353cbed438c29fe62ff7315fea2a90ff3cc16055801939f647d2f2d26
SHA51271fc1a046d3b60dd91ee6d6bd4d9d433d5361f02d781a56b9677ba02748497c0284288dc128cce24438bc22ab3fc6256882744ac63a35061cf692d8aec088868