Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 20:03
Behavioral task
behavioral1
Sample
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
Resource
win7-20241010-en
General
-
Target
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
-
Size
372KB
-
MD5
0fd2fb57d697134c46176d4fcf246c58
-
SHA1
52fe4673a83061ca16e4b9a374c085ef5543764f
-
SHA256
1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149
-
SHA512
26e6f4e42df55acfd31681727fcc9e5ed6d8816796963f1a4b05fa9908970714719238ec6800d65724aca88ead75945626a84ba236636678de29e78c99c2cf58
-
SSDEEP
6144:mDKW1Lgbdl0TBBvjc/eVMUfTYOrQGznwWPatMGpjSTBvt0ZSwtQe:Ah1Lk70TnvjcmzEW0ZS5e
Malware Config
Signatures
-
Detect XenoRat Payload 35 IoCs
resource yara_rule behavioral2/memory/2468-1-0x0000000004AC0000-0x0000000004B42000-memory.dmp family_xenorat behavioral2/memory/2468-4-0x0000000005120000-0x00000000051A0000-memory.dmp family_xenorat behavioral2/memory/2468-52-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-37-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-58-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-71-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-68-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-62-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-56-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-54-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-50-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-48-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-46-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-44-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-42-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-40-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-33-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-31-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-29-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-23-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-21-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-19-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-15-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-13-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-11-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-9-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-7-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-6-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-66-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-64-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-60-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-35-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-27-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-25-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat behavioral2/memory/2468-17-0x0000000005120000-0x000000000519B000-memory.dmp family_xenorat -
Xenorat family
-
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2468-1-0x0000000004AC0000-0x0000000004B42000-memory.dmp net_reactor behavioral2/memory/2468-4-0x0000000005120000-0x00000000051A0000-memory.dmp net_reactor behavioral2/memory/2468-52-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-37-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-58-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-71-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-68-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-62-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-56-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-54-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-50-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-48-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-46-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-44-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-42-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-40-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-33-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-31-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-29-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-23-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-21-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-19-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-15-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-13-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-11-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-9-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-7-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-6-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-66-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-64-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-60-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-35-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-27-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-25-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor behavioral2/memory/2468-17-0x0000000005120000-0x000000000519B000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2468 1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe"C:\Users\Admin\AppData\Local\Temp\1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2468