Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 13:59
Behavioral task
behavioral1
Sample
sus.exe
Resource
win7-20240903-en
General
-
Target
sus.exe
-
Size
45KB
-
MD5
abc9eef67fe0bd1ec7a09ded620a3d76
-
SHA1
e6ac893dbbb2fbe449463b75ec6831df208ee9af
-
SHA256
965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
-
SHA512
f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293
-
SSDEEP
768:NdhO/poiiUcjlJIn2wH9Xqk5nWEZ5SbTDacWI7CPW5c:Dw+jjgnnH9XqcnW85SbTNWIk
Malware Config
Extracted
xenorat
lesbian-failures.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
11241
-
startup_name
suss.exe
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/2684-1-0x0000000000210000-0x0000000000222000-memory.dmp family_xenorat behavioral2/files/0x0007000000023cc0-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation sus.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 sus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1676 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2700 2684 sus.exe 85 PID 2684 wrote to memory of 2700 2684 sus.exe 85 PID 2684 wrote to memory of 2700 2684 sus.exe 85 PID 2700 wrote to memory of 1676 2700 sus.exe 87 PID 2700 wrote to memory of 1676 2700 sus.exe 87 PID 2700 wrote to memory of 1676 2700 sus.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\sus.exe"C:\Users\Admin\AppData\Local\Temp\sus.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\sus.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\sus.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "suss.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBF68.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5abc9eef67fe0bd1ec7a09ded620a3d76
SHA1e6ac893dbbb2fbe449463b75ec6831df208ee9af
SHA256965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
SHA512f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293
-
Filesize
1KB
MD525eb3818f0cb98ed59a6c13214be6b8d
SHA14f6777adaf267d631031283198ce2860c9822cd5
SHA2560c3179cb64d898a5c361d5ebbb95fb566c96a2e150e07288a283df545667857c
SHA5126e2f0a746d754bc15fe45d7edd4f7c004d58eb8e15e08c499fd1e1e40d248e8d2bcf58f1f5447470292f4a25499132682e12961356a68a6f8551801ba6410667