Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
cfbd38c30f1100b5213c9dd008b6e883
-
SHA1
03da6d72c9d92bea2b2e5c4a8538f0a3628fbe73
-
SHA256
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5
-
SHA512
a7d3bce28d0443dbe671394bd6c720f0fba28cf18ee0a5c3bfe547c3ffaebb9431ebe40749de1eb460b03696a401c167d76de99e9769e33ca62a3bf8302a5b04
-
SSDEEP
24576:A05tJ299B2yluNG+pyZNNs62IgDEs5GM7qSNKs0kjk7/ewTZJuw2PZ9Wb7BjpI/P:A012XZ03pETO3J7qGKs0k47jLj2P86/
Malware Config
Extracted
xenorat
beastsband.com
x3n0
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4588-6-0x00000000085D0000-0x00000000086CA000-memory.dmp family_xenorat behavioral2/memory/4588-41-0x0000000008F30000-0x0000000008F3C000-memory.dmp family_xenorat -
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4588 file.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe 4588 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4588 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4588
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1