Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 20:03
Behavioral task
behavioral1
Sample
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
Resource
win7-20241010-en
General
-
Target
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
-
Size
372KB
-
MD5
0fd2fb57d697134c46176d4fcf246c58
-
SHA1
52fe4673a83061ca16e4b9a374c085ef5543764f
-
SHA256
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149
-
SHA512
26e6f4e42df55acfd31681727fcc9e5ed6d8816796963f1a4b05fa9908970714719238ec6800d65724aca88ead75945626a84ba236636678de29e78c99c2cf58
-
SSDEEP
6144:mDKW1Lgbdl0TBBvjc/eVMUfTYOrQGznwWPatMGpjSTBvt0ZSwtQe:Ah1Lk70TnvjcmzEW0ZS5e
Malware Config
Signatures
-
Detect XenoRat Payload 35 IoCs
resource yara_rule behavioral1/memory/2000-1-0x0000000002140000-0x00000000021C2000-memory.dmp family_xenorat behavioral1/memory/2000-3-0x0000000004970000-0x00000000049F0000-memory.dmp family_xenorat behavioral1/memory/2000-6-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-7-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-21-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-19-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-17-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-15-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-13-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-11-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-9-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-23-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-25-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-27-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-29-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-31-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-33-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-35-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-37-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-39-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-41-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-43-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-45-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-47-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-49-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-51-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-53-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-55-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-57-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-59-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-62-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-64-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-66-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-68-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat behavioral1/memory/2000-70-0x0000000004970000-0x00000000049EB000-memory.dmp family_xenorat -
Xenorat family
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2000-1-0x0000000002140000-0x00000000021C2000-memory.dmp net_reactor behavioral1/memory/2000-3-0x0000000004970000-0x00000000049F0000-memory.dmp net_reactor behavioral1/memory/2000-6-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-7-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-21-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-19-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-17-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-15-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-13-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-11-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-9-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-23-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-25-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-27-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-29-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-31-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-33-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-35-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-37-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-39-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-41-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-43-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-45-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-47-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-49-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-51-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-53-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-55-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-57-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-59-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-62-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-64-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-66-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-68-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor behavioral1/memory/2000-70-0x0000000004970000-0x00000000049EB000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe"C:\Users\Admin\AppData\Local\Temp\1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000