Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 19:32
Behavioral task
behavioral1
Sample
59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe
Resource
win7-20240903-en
General
-
Target
59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe
-
Size
3.9MB
-
MD5
9ce8e0cbb54f24de304851e0b7226c0a
-
SHA1
1db4c3d746ea0ad15e98ed3a2b96c2ca09fb1366
-
SHA256
59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5
-
SHA512
fe5fd7e0f40074e45ad5a1709ff72670d47c2cb5e383cc9f6f4baccb21374a334d2ca1d970534f8815ae9a68c1e1f27b6517e3f8eb0a365b390686d61d0e97f8
-
SSDEEP
98304:xIQjojuFS4tTWv+uwCu48dIrvmnpE4h5CG4DdtED/:2KsovGIL5eG+C/
Malware Config
Extracted
xenorat
96.126.118.61
Microsoft Windows_3371808
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
svchost.exe
Signatures
-
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Deletes itself 1 IoCs
pid Process 1188 cmd.exe -
resource yara_rule behavioral1/memory/2248-36-0x0000000000FE0000-0x0000000001984000-memory.dmp themida behavioral1/memory/2248-37-0x0000000000FE0000-0x0000000001984000-memory.dmp themida behavioral1/memory/2248-60-0x0000000000FE0000-0x0000000001984000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2584 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 30 PID 2248 wrote to memory of 2584 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 30 PID 2248 wrote to memory of 2584 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 30 PID 2248 wrote to memory of 2584 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 30 PID 2248 wrote to memory of 1360 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 34 PID 2248 wrote to memory of 1360 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 34 PID 2248 wrote to memory of 1360 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 34 PID 2248 wrote to memory of 1360 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 34 PID 2248 wrote to memory of 2016 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 36 PID 2248 wrote to memory of 2016 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 36 PID 2248 wrote to memory of 2016 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 36 PID 2248 wrote to memory of 2016 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 36 PID 2248 wrote to memory of 1188 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 38 PID 2248 wrote to memory of 1188 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 38 PID 2248 wrote to memory of 1188 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 38 PID 2248 wrote to memory of 1188 2248 59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe 38 PID 1188 wrote to memory of 2972 1188 cmd.exe 40 PID 1188 wrote to memory of 2972 1188 cmd.exe 40 PID 1188 wrote to memory of 2972 1188 cmd.exe 40 PID 1188 wrote to memory of 2972 1188 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe"C:\Users\Admin\AppData\Local\Temp\59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "svchost.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2F1C.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv2⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn "\svchost.exe" /f2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\59cd7e7b0c1c0760cb9499775184b02d8a8e3188bacd9420b04987b0b5724eb5.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e9b0ad3e16e036a9706b9e2feb90763
SHA16d32912800a795831e2638dd0a8e8c9cb581f7c2
SHA25643b9a2bd35734adab49c0221436dc6a3e4231f4a6f8ed24b80d7320ca2257fb0
SHA512901d8dedb660d18717ca5f06701c7c160861bccf0e2f6655be183584845d4b85a92dbe39dc417f125d63b9ba711f2502cf2d13e8bdcba94f6da50a79cf4f51df