Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 13:59
Behavioral task
behavioral1
Sample
sus.exe
Resource
win7-20240903-en
General
-
Target
sus.exe
-
Size
45KB
-
MD5
abc9eef67fe0bd1ec7a09ded620a3d76
-
SHA1
e6ac893dbbb2fbe449463b75ec6831df208ee9af
-
SHA256
965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
-
SHA512
f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293
-
SSDEEP
768:NdhO/poiiUcjlJIn2wH9Xqk5nWEZ5SbTDacWI7CPW5c:Dw+jjgnnH9XqcnW85SbTNWIk
Malware Config
Extracted
xenorat
lesbian-failures.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
11241
-
startup_name
suss.exe
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2616-1-0x0000000001120000-0x0000000001132000-memory.dmp family_xenorat behavioral1/files/0x000700000001868b-4.dat family_xenorat behavioral1/memory/2728-9-0x0000000000950000-0x0000000000962000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2728 sus.exe -
Loads dropped DLL 1 IoCs
pid Process 2616 sus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2224 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2728 2616 sus.exe 30 PID 2616 wrote to memory of 2728 2616 sus.exe 30 PID 2616 wrote to memory of 2728 2616 sus.exe 30 PID 2616 wrote to memory of 2728 2616 sus.exe 30 PID 2728 wrote to memory of 2224 2728 sus.exe 31 PID 2728 wrote to memory of 2224 2728 sus.exe 31 PID 2728 wrote to memory of 2224 2728 sus.exe 31 PID 2728 wrote to memory of 2224 2728 sus.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sus.exe"C:\Users\Admin\AppData\Local\Temp\sus.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\sus.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\sus.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "suss.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D8.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD525eb3818f0cb98ed59a6c13214be6b8d
SHA14f6777adaf267d631031283198ce2860c9822cd5
SHA2560c3179cb64d898a5c361d5ebbb95fb566c96a2e150e07288a283df545667857c
SHA5126e2f0a746d754bc15fe45d7edd4f7c004d58eb8e15e08c499fd1e1e40d248e8d2bcf58f1f5447470292f4a25499132682e12961356a68a6f8551801ba6410667
-
Filesize
45KB
MD5abc9eef67fe0bd1ec7a09ded620a3d76
SHA1e6ac893dbbb2fbe449463b75ec6831df208ee9af
SHA256965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
SHA512f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293