Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 03:08
Behavioral task
behavioral1
Sample
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
Resource
win7-20240903-en
General
-
Target
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
-
Size
43KB
-
MD5
8b3bc56d3cb76d2a29e374b10252e190
-
SHA1
cefb89b9265eb17ec51e5fe052604d37ac4ed7fb
-
SHA256
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8e
-
SHA512
ff331c78ab348ed258b6ad6e1dcd1800aa400dce422b1d7ee531aa48ba6c97af84545db95c58f119fe7ec46644d93c6ec3e48882dd3c64d5ba70d5ec46157a14
-
SSDEEP
768:F/jqPyqisr4dGirXAHg5rbWOXBDZY9M7Sd/bDXNJb7bTDaSVIV27J:FNqwosBDZY9MKjBJb7bTnVIgJ
Malware Config
Extracted
xenorat
92.210.247.134
NotronANtivirusClientbyme
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
notron_av
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/1800-1-0x0000000000FA0000-0x0000000000FB2000-memory.dmp family_xenorat behavioral1/files/0x000800000001613e-4.dat family_xenorat behavioral1/memory/3044-10-0x0000000000140000-0x0000000000152000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 3044 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe -
Loads dropped DLL 1 IoCs
pid Process 1800 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3044 1800 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 30 PID 1800 wrote to memory of 3044 1800 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 30 PID 1800 wrote to memory of 3044 1800 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 30 PID 1800 wrote to memory of 3044 1800 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 30 PID 3044 wrote to memory of 2800 3044 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 31 PID 3044 wrote to memory of 2800 3044 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 31 PID 3044 wrote to memory of 2800 3044 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 31 PID 3044 wrote to memory of 2800 3044 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"C:\Users\Admin\AppData\Local\Temp\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"C:\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "notron_av" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC4D5.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55e8d46b54695f4c038ba0a15ab5459c4
SHA14cb3e76f5fb2c4b1a4c7900348c10fb820df063c
SHA25638dc72902fa5b508a293b9a9f703e36b263b90857bb758774a819821074443a3
SHA51203e40c17ed291909e20df9344c80ee92e1d30730cc9d4b8ad40bcd54c63e42b136340387b466aec807b3593bdb48d2c1587188ef68e4292f3e92868b29f9e74a
-
\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
Filesize43KB
MD58b3bc56d3cb76d2a29e374b10252e190
SHA1cefb89b9265eb17ec51e5fe052604d37ac4ed7fb
SHA2563efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8e
SHA512ff331c78ab348ed258b6ad6e1dcd1800aa400dce422b1d7ee531aa48ba6c97af84545db95c58f119fe7ec46644d93c6ec3e48882dd3c64d5ba70d5ec46157a14