Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 19:31
Behavioral task
behavioral1
Sample
System32.exe
Resource
win7-20240903-en
General
-
Target
System32.exe
-
Size
45KB
-
MD5
896081ff179580794b2e56d763e60e5a
-
SHA1
97dca39b6a660e9e1285b401456576fdd0998710
-
SHA256
acf6b4e5100ebd3921ea434dfb8e6fe93c3933390ec960a18670120d6732125b
-
SHA512
48809ea72174b61a8b6ee24c61a42257e60ac10980098c3fbad45cab00eb96065662bd57425f6dbd2f561f30ab88395f4cb568a7fdc62645824ed1de403a145e
-
SSDEEP
768:MdhO/poiiUcjlJIndfH9Xqk5nWEZ5SbTDatuI7CPW5S:Gw+jjgnVH9XqcnW85SbTwuIK
Malware Config
Extracted
xenorat
127.0.0.1
System32
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
System32
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1716-1-0x0000000000EE0000-0x0000000000EF2000-memory.dmp family_xenorat behavioral1/files/0x0008000000016eca-4.dat family_xenorat behavioral1/memory/1256-9-0x0000000000220000-0x0000000000232000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 1256 System32.exe -
Loads dropped DLL 1 IoCs
pid Process 1716 System32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1256 1716 System32.exe 31 PID 1716 wrote to memory of 1256 1716 System32.exe 31 PID 1716 wrote to memory of 1256 1716 System32.exe 31 PID 1716 wrote to memory of 1256 1716 System32.exe 31 PID 1256 wrote to memory of 2852 1256 System32.exe 32 PID 1256 wrote to memory of 2852 1256 System32.exe 32 PID 1256 wrote to memory of 2852 1256 System32.exe 32 PID 1256 wrote to memory of 2852 1256 System32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\System32.exe"C:\Users\Admin\AppData\Local\Temp\System32.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\System32.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\System32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "System32" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1AF.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b34fc460ef3471937aafe3b06e4f954c
SHA1ed9abcc6b0430edbbdf4cf2c43243ba1a17e7aa2
SHA256edacee32c3c4ba1c86b77b520a8f6d52e7aa004ff714c70bc2437877cde68c2b
SHA512e3a1d215fb9808e69d10eb7852bedbbf1390bc2b0296a8187ea5d8cb6d393321f8bfae86e0407849b728ca2626b44314ad9c6c62cbcb58b63e33a57372018afd
-
Filesize
45KB
MD5896081ff179580794b2e56d763e60e5a
SHA197dca39b6a660e9e1285b401456576fdd0998710
SHA256acf6b4e5100ebd3921ea434dfb8e6fe93c3933390ec960a18670120d6732125b
SHA51248809ea72174b61a8b6ee24c61a42257e60ac10980098c3fbad45cab00eb96065662bd57425f6dbd2f561f30ab88395f4cb568a7fdc62645824ed1de403a145e