Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 03:08
Behavioral task
behavioral1
Sample
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
Resource
win7-20240903-en
General
-
Target
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
-
Size
43KB
-
MD5
8b3bc56d3cb76d2a29e374b10252e190
-
SHA1
cefb89b9265eb17ec51e5fe052604d37ac4ed7fb
-
SHA256
3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8e
-
SHA512
ff331c78ab348ed258b6ad6e1dcd1800aa400dce422b1d7ee531aa48ba6c97af84545db95c58f119fe7ec46644d93c6ec3e48882dd3c64d5ba70d5ec46157a14
-
SSDEEP
768:F/jqPyqisr4dGirXAHg5rbWOXBDZY9M7Sd/bDXNJb7bTDaSVIV27J:FNqwosBDZY9MKjBJb7bTnVIgJ
Malware Config
Extracted
xenorat
92.210.247.134
NotronANtivirusClientbyme
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
notron_av
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3380-1-0x0000000000280000-0x0000000000292000-memory.dmp family_xenorat behavioral2/files/0x0007000000023c9d-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe -
Executes dropped EXE 1 IoCs
pid Process 3464 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3788 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3464 3380 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 82 PID 3380 wrote to memory of 3464 3380 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 82 PID 3380 wrote to memory of 3464 3380 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 82 PID 3464 wrote to memory of 3788 3464 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 85 PID 3464 wrote to memory of 3788 3464 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 85 PID 3464 wrote to memory of 3788 3464 3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"C:\Users\Admin\AppData\Local\Temp\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"C:\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "notron_av" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C4F.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD55e8d46b54695f4c038ba0a15ab5459c4
SHA14cb3e76f5fb2c4b1a4c7900348c10fb820df063c
SHA25638dc72902fa5b508a293b9a9f703e36b263b90857bb758774a819821074443a3
SHA51203e40c17ed291909e20df9344c80ee92e1d30730cc9d4b8ad40bcd54c63e42b136340387b466aec807b3593bdb48d2c1587188ef68e4292f3e92868b29f9e74a
-
C:\Users\Admin\AppData\Roaming\XenoManager\3efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8eN.exe
Filesize43KB
MD58b3bc56d3cb76d2a29e374b10252e190
SHA1cefb89b9265eb17ec51e5fe052604d37ac4ed7fb
SHA2563efcde49be9e18cebc5d95cbf04597be4ee7b95310f691b5e0a3275f77589a8e
SHA512ff331c78ab348ed258b6ad6e1dcd1800aa400dce422b1d7ee531aa48ba6c97af84545db95c58f119fe7ec46644d93c6ec3e48882dd3c64d5ba70d5ec46157a14