Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 17:26
Behavioral task
behavioral1
Sample
utthdfgd.exe
Resource
win7-20240729-en
General
-
Target
utthdfgd.exe
-
Size
45KB
-
MD5
f0fdc0b13c302bedbbebf9883cf3ffa2
-
SHA1
3a0bfca5bd5695372d57029a24f99b1ecbefe443
-
SHA256
f121a7a6bec3889cdf928ab386d5115f9485e0df3943f1e7155829254ee13847
-
SHA512
f25f19c0ab53811e4ba0ed2c56359789323375272d3685e698fd330e3a7b21ce0eb84e2f223ddc0125661b536baebb53ce78f6c5e40d1840bff5c4f3f5fe3f9f
-
SSDEEP
768:FdhO/poiiUcjlJInazH9Xqk5nWEZ5SbTDa+WI7CPW59:bw+jjgnYH9XqcnW85SbTPWIV
Malware Config
Extracted
xenorat
0.0.0.0
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
8888
-
startup_name
Windows
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2088-1-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xenorat behavioral1/files/0x0007000000018780-4.dat family_xenorat behavioral1/memory/2772-9-0x0000000001070000-0x0000000001082000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2772 utthdfgd.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 utthdfgd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utthdfgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utthdfgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2772 2088 utthdfgd.exe 30 PID 2088 wrote to memory of 2772 2088 utthdfgd.exe 30 PID 2088 wrote to memory of 2772 2088 utthdfgd.exe 30 PID 2088 wrote to memory of 2772 2088 utthdfgd.exe 30 PID 2772 wrote to memory of 2844 2772 utthdfgd.exe 31 PID 2772 wrote to memory of 2844 2772 utthdfgd.exe 31 PID 2772 wrote to memory of 2844 2772 utthdfgd.exe 31 PID 2772 wrote to memory of 2844 2772 utthdfgd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\utthdfgd.exe"C:\Users\Admin\AppData\Local\Temp\utthdfgd.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\XenoManager\utthdfgd.exe"C:\Users\Admin\AppData\Roaming\XenoManager\utthdfgd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp41E0.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD506e85dacdfe730c91184c0fbf263a068
SHA1b4e823bd79b7da585a1d5a606745cba6bb48fb34
SHA256b4c95b80c0d1b208296ec426811c8ccd49f91fcde094efd7df34059a021818c9
SHA5122dc699a530aed67b2162342133e3d76da6190dd2939bba420f775715cdf58d9a15cc2c332a376a770cfca7e50976d0348d116e2d39b0561d39243cc2faf7f153
-
Filesize
45KB
MD5f0fdc0b13c302bedbbebf9883cf3ffa2
SHA13a0bfca5bd5695372d57029a24f99b1ecbefe443
SHA256f121a7a6bec3889cdf928ab386d5115f9485e0df3943f1e7155829254ee13847
SHA512f25f19c0ab53811e4ba0ed2c56359789323375272d3685e698fd330e3a7b21ce0eb84e2f223ddc0125661b536baebb53ce78f6c5e40d1840bff5c4f3f5fe3f9f