Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 09:07
Behavioral task
behavioral1
Sample
26973056c194b68b10d1c2b9a632a27e.doc
Resource
win7-20240729-en
General
-
Target
26973056c194b68b10d1c2b9a632a27e.doc
-
Size
47KB
-
MD5
26973056c194b68b10d1c2b9a632a27e
-
SHA1
0b61132df948c4d48e81b631bdad91be1080f530
-
SHA256
4a58b228b23cdc286d103115b2fb312eedf6741aeada17b242620b6737db1035
-
SHA512
72a2120c4e62e91aec8cf5ec14ca42d5088944b4652dd5c69be15640bb3c260a8eb74984659f98d2161671bc4b4da0397542d4e0d24e30518374ff686ed66c2e
-
SSDEEP
384:5fFAhRp/6j1dhUsQGlWmxDJzkpiSY5UyCUuCJbnsQfzyK9tujq/z60jAx7:5KhHi3KnCWmHzk7o3JzVip
Malware Config
Extracted
xenorat
87.120.120.27
Xeno_rat_nd8912d
-
delay
11000
-
install_path
appdata
-
port
2222
-
startup_name
mrec
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2960-97-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2960-100-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat behavioral1/memory/2960-105-0x0000000000400000-0x0000000000412000-memory.dmp family_xenorat -
Xenorat family
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2728 MDEODF.exe 2960 MDEODF.exe 2996 MDEODF.exe 1088 MDEODF.exe 592 MDEODF.exe 2372 MDEODF.exe 2088 MDEODF.exe 2348 MDEODF.exe -
Loads dropped DLL 5 IoCs
pid Process 2652 WINWORD.EXE 2652 WINWORD.EXE 2652 WINWORD.EXE 2652 WINWORD.EXE 2996 MDEODF.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2728 set thread context of 2960 2728 MDEODF.exe 33 PID 2728 set thread context of 2996 2728 MDEODF.exe 34 PID 2728 set thread context of 1088 2728 MDEODF.exe 35 PID 592 set thread context of 2372 592 MDEODF.exe 37 PID 592 set thread context of 2088 592 MDEODF.exe 38 PID 592 set thread context of 2348 592 MDEODF.exe 39 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDEODF.exe -
Office loads VBA resources, possible macro or embedded object present
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1064 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2652 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 MDEODF.exe Token: SeDebugPrivilege 592 MDEODF.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 WINWORD.EXE 2652 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2728 2652 WINWORD.EXE 30 PID 2652 wrote to memory of 2728 2652 WINWORD.EXE 30 PID 2652 wrote to memory of 2728 2652 WINWORD.EXE 30 PID 2652 wrote to memory of 2728 2652 WINWORD.EXE 30 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2960 2728 MDEODF.exe 33 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 2996 2728 MDEODF.exe 34 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2728 wrote to memory of 1088 2728 MDEODF.exe 35 PID 2996 wrote to memory of 592 2996 MDEODF.exe 36 PID 2996 wrote to memory of 592 2996 MDEODF.exe 36 PID 2996 wrote to memory of 592 2996 MDEODF.exe 36 PID 2996 wrote to memory of 592 2996 MDEODF.exe 36 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2372 592 MDEODF.exe 37 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2088 592 MDEODF.exe 38 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 592 wrote to memory of 2348 592 MDEODF.exe 39 PID 2652 wrote to memory of 336 2652 WINWORD.EXE 40 PID 2652 wrote to memory of 336 2652 WINWORD.EXE 40
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26973056c194b68b10d1c2b9a632a27e.doc"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "mrec" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE254.tmp" /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1064
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exe"C:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exeC:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exeC:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exeC:\Users\Admin\AppData\Roaming\UpdateManager\MDEODF.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\MDEODF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52252d13c1250e721a097456d0dcdb094
SHA1dc9eb91dcf5ca59c2d8e6e820fd11a2372c68a1f
SHA256b3bdf8781809c2231b91a866b457b26f102f340acc1bfb07b4c52239e992283f
SHA5129b9eab3c92d69075649f73435700618f1b14467de85380b03fe292f619675a50abbc98e614151f02a3246d29989794ae7c885237a8d4b57064c04f023179850a
-
Filesize
166KB
MD5f44302503ea4eedfa831c25711df51b7
SHA1127d6ec83904de48d90c293e53c905fc4206bfb8
SHA25621b7b8656a008ad3e5df1725cddf55e650812c1f3d59609f14c0d3089a886de6
SHA51271e9512244d864b53abf436b496a53e6771135cc7d5fc0e4df7d04ac23074b6ed1e7438a28bc232a70f57de97367f0e3a21925bed738c5e47bdf3487ab2f4e03