Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 14:36
Behavioral task
behavioral1
Sample
cres.exe
Resource
win7-20241010-en
General
-
Target
cres.exe
-
Size
45KB
-
MD5
1e7700efbf15f37dd3f86f05c622ae32
-
SHA1
651957f68d597141fc5325e62189330e05434e74
-
SHA256
15c2892194da8b7dd9ca72cdec0b3fb3eff422361f603ae2ae17e4be21154928
-
SHA512
72f1a14b3e20fdf8e9c362cf621b2d1ad04dca4dcaffa0dfd9b3c6e502ed8cd6834194ddeebda74e0d6d38db3ea2102e7ec0bcb6f858df281325e9842e19b11b
-
SSDEEP
768:pdhO/poiiUcjlJInMC2H9Xqk5nWEZ5SbTDaauI7CPW5H:nw+jjgnt2H9XqcnW85SbT3uIf
Malware Config
Extracted
xenorat
90.202.105.39
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
manager
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2060-1-0x0000000000B10000-0x0000000000B22000-memory.dmp family_xenorat behavioral1/files/0x000b000000016c1a-4.dat family_xenorat behavioral1/memory/2556-9-0x0000000000120000-0x0000000000132000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2556 cres.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 cres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2556 2060 cres.exe 31 PID 2060 wrote to memory of 2556 2060 cres.exe 31 PID 2060 wrote to memory of 2556 2060 cres.exe 31 PID 2060 wrote to memory of 2556 2060 cres.exe 31 PID 2556 wrote to memory of 2140 2556 cres.exe 32 PID 2556 wrote to memory of 2140 2556 cres.exe 32 PID 2556 wrote to memory of 2140 2556 cres.exe 32 PID 2556 wrote to memory of 2140 2556 cres.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cres.exe"C:\Users\Admin\AppData\Local\Temp\cres.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\cres.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\cres.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "manager" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF6DD.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed2ac3231d5a7037e886bbe03105f63a
SHA179c49e9ec0ffa044c6e83be9ca6a9f47c7626e78
SHA256a8237f3aefc09e08608161abaa554ce88d4d706d6cbe1814b7ceff7508cd34a4
SHA512a324b3e7475632dcf5f7bca167fa2d062a856a4e54751a94f89627e8c47787d968dc3133376a644786037c3d436da17e8e751353d176482fd1443eeaa4bce0cb
-
Filesize
45KB
MD51e7700efbf15f37dd3f86f05c622ae32
SHA1651957f68d597141fc5325e62189330e05434e74
SHA25615c2892194da8b7dd9ca72cdec0b3fb3eff422361f603ae2ae17e4be21154928
SHA51272f1a14b3e20fdf8e9c362cf621b2d1ad04dca4dcaffa0dfd9b3c6e502ed8cd6834194ddeebda74e0d6d38db3ea2102e7ec0bcb6f858df281325e9842e19b11b