Analysis
-
max time kernel
284s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
zgouble.exe
Resource
win7-20240903-en
General
-
Target
zgouble.exe
-
Size
625KB
-
MD5
58133b496a35609d10cc64215b5fc990
-
SHA1
dc6bb593c22e664a8d7629e0663820f9207592d1
-
SHA256
2d08e8130fcd20c4e4332010481247cf00062af6cafbbfd4cbe096a9c62d5d7d
-
SHA512
4d2a18cd02f214740d1834930246da55757ff92edec2b1fc64191ab4fc612a3a18cbaa443f9ef5329f5be6150b1487bc0f5c7bff5c5b4469c5bdd9517a526cc8
-
SSDEEP
12288:IcrNS33L10QdrX4tJD4nmvDLI0ZOZPu8+NYzv3epjcuXjc6l02gq4Ne2o:7NA3R5drX4j4m70Ee3eSuXjtvJ4sN
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
60000
-
install_path
temp
-
port
1391
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/3828-31-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation zgouble.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cvghfy.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cvghfy.exe -
Executes dropped EXE 7 IoCs
pid Process 4532 cvghfy.sfx.exe 1256 cvghfy.exe 2124 cvghfy.exe 3828 cvghfy.exe 4900 cvghfy.exe 4860 cvghfy.exe 3012 cvghfy.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1256 set thread context of 2124 1256 cvghfy.exe 93 PID 1256 set thread context of 3828 1256 cvghfy.exe 94 PID 4900 set thread context of 4860 4900 cvghfy.exe 100 PID 4900 set thread context of 3012 4900 cvghfy.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2124 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgouble.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvghfy.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1256 cvghfy.exe Token: SeDebugPrivilege 4900 cvghfy.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3756 1640 zgouble.exe 84 PID 1640 wrote to memory of 3756 1640 zgouble.exe 84 PID 1640 wrote to memory of 3756 1640 zgouble.exe 84 PID 3756 wrote to memory of 4532 3756 cmd.exe 88 PID 3756 wrote to memory of 4532 3756 cmd.exe 88 PID 3756 wrote to memory of 4532 3756 cmd.exe 88 PID 4532 wrote to memory of 1256 4532 cvghfy.sfx.exe 90 PID 4532 wrote to memory of 1256 4532 cvghfy.sfx.exe 90 PID 4532 wrote to memory of 1256 4532 cvghfy.sfx.exe 90 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 2124 1256 cvghfy.exe 93 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 1256 wrote to memory of 3828 1256 cvghfy.exe 94 PID 3828 wrote to memory of 4900 3828 cvghfy.exe 97 PID 3828 wrote to memory of 4900 3828 cvghfy.exe 97 PID 3828 wrote to memory of 4900 3828 cvghfy.exe 97 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 4860 4900 cvghfy.exe 100 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4900 wrote to memory of 3012 4900 cvghfy.exe 101 PID 4860 wrote to memory of 2468 4860 cvghfy.exe 108 PID 4860 wrote to memory of 2468 4860 cvghfy.exe 108 PID 4860 wrote to memory of 2468 4860 cvghfy.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\zgouble.exe"C:\Users\Admin\AppData\Local\Temp\zgouble.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\cfgdf.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Roaming\cvghfy.sfx.execvghfy.sfx.exe -dC:\Users\Admin\AppData\Roaming -peyhrntdesczopthnymkdespbodtyuhngfszafugyRhvqxsdfHbgnmeL3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Roaming\cvghfy.exe"C:\Users\Admin\AppData\Roaming\cvghfy.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\cvghfy.exeC:\Users\Admin\AppData\Roaming\cvghfy.exe5⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 806⤵
- Program crash
PID:2504
-
-
-
C:\Users\Admin\AppData\Roaming\cvghfy.exeC:\Users\Admin\AppData\Roaming\cvghfy.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exe"C:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "UpdateManager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC704.tmp" /F8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exeC:\Users\Admin\AppData\Local\Temp\UpdateManager\cvghfy.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2124 -ip 21241⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
1KB
MD5ab249650b85443ac128c24bb9feed685
SHA1fad1eccebd31e34a6849d53e748397732b1b58bd
SHA2563397551e013d6e71e90ff8e849475d966ad00abed7dc4462ab620e1f00c5a19f
SHA512a02c890e9733b6c210b64df1e2addee8ae256096e92c3380d8b0a912fa2804d796046d15e7855fee9c8548de45977a71fdcc517c25721eb8501704e2d7ac8132
-
Filesize
18KB
MD567605d4576fc9218ca922faaccf44961
SHA10f4adb98ea10f90b3984a10837aa2c653700986b
SHA25618abc987c2a04a7c576d7a5c86588467cbf6cc2bb15eadbc60c0336e2fff11d8
SHA512ef570ad9ebbe64245a8b6d972c77c6dd96adf869e06e8834754a2f90b4c8171a66233db3d27938b3ec30e19ec070dfac2160d7e5b58f477c3d44a20d2be16707
-
Filesize
246KB
MD581803959df039efd73a59e513065ea5c
SHA122328ae1cbf3c7e21b374bfcff7938d3f11f6459
SHA25646affe6213f26e1a5446134c994e14d3f3f500e3c88f7867e3102c4b171cead1
SHA512a01ab581c35a38631e8074d3c6f4412397874b80684374bc5db426de908d84fac98dfd0bfba1c1db5bb8c559fc88f6fac1918ad06b79050b4b5704b973bf53b3
-
Filesize
477KB
MD568b0b2d1155fbefde17060028186ef37
SHA139fcab2dbbaaf0c92a7af7179fd4932d6c8758e8
SHA25629cce673a99fc812b911d71447ebc7c27240185d68471275d5878d15b5412724
SHA5121d4c0eb0c668c4b4ecd3daddcd73f78ec72509f8b867ab82813aae8a4cf0ea94fc471454caf63b5b5b5da280ebcb5841b52bcc39b91ec2741d0c3d6a74bf694a