Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28-11-2024 19:04
General
-
Target
ByeFunV1Helper.exe
-
Size
61KB
-
MD5
4853487df85809a47fd28f81f60914e3
-
SHA1
efa5f925e0587a5282154def356c93ca6c56fac8
-
SHA256
93d60d73b33815ffcfa599af4dde3a900bf3ed880d667b2029a6c791d6340810
-
SHA512
84afd14836ac592548e35f9c03eaabcce22a0d18e3ad596be99f3924e094856d9733fb3e2844bc629ba9dedcdcf22c14d77b2527de475a95d788f6ee2678623d
-
SSDEEP
1536:Bw+jjgnNH9XqcnW85SbTiuIyLJ+/oOyc:Bw+jqV91UbTiIN+Afc
Malware Config
Extracted
xenorat
10.9.30.162
ByeFunV1Helper
-
delay
5000
-
install_path
appdata
-
port
4872
-
startup_name
BYEFUNHELPERINJECTED
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/2724-1-0x0000000000F30000-0x0000000000F46000-memory.dmp family_xenorat behavioral1/files/0x002900000004505f-2.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation ByeFunV1Helper.exe -
Executes dropped EXE 1 IoCs
pid Process 4360 ByeFunV1Helper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ByeFunV1Helper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ByeFunV1Helper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4236 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4360 2724 ByeFunV1Helper.exe 81 PID 2724 wrote to memory of 4360 2724 ByeFunV1Helper.exe 81 PID 2724 wrote to memory of 4360 2724 ByeFunV1Helper.exe 81 PID 4360 wrote to memory of 4236 4360 ByeFunV1Helper.exe 86 PID 4360 wrote to memory of 4236 4360 ByeFunV1Helper.exe 86 PID 4360 wrote to memory of 4236 4360 ByeFunV1Helper.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ByeFunV1Helper.exe"C:\Users\Admin\AppData\Local\Temp\ByeFunV1Helper.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\XenoManager\ByeFunV1Helper.exe"C:\Users\Admin\AppData\Roaming\XenoManager\ByeFunV1Helper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "BYEFUNHELPERINJECTED" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A1F.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
1KB
MD5bb70f1cba24f68d4cb6eacd5d6035625
SHA1c8705627c78eabd594a31042b9db58fd3bd115b7
SHA2560a71ff9931e7ad8cd696b9b77405702708996905e0e050a178d321779484d54a
SHA512ea16a159d812c4c5f4b9030e54ca0079bec35b8b6872166c0eb945aa526f244f52b6de673cb8c4b8c496b471df247065f5abaa701ad5991a13faf8c60e268ff6
-
Filesize
61KB
MD54853487df85809a47fd28f81f60914e3
SHA1efa5f925e0587a5282154def356c93ca6c56fac8
SHA25693d60d73b33815ffcfa599af4dde3a900bf3ed880d667b2029a6c791d6340810
SHA51284afd14836ac592548e35f9c03eaabcce22a0d18e3ad596be99f3924e094856d9733fb3e2844bc629ba9dedcdcf22c14d77b2527de475a95d788f6ee2678623d