Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 17:26
Behavioral task
behavioral1
Sample
utthdfgd.exe
Resource
win7-20240729-en
General
-
Target
utthdfgd.exe
-
Size
45KB
-
MD5
f0fdc0b13c302bedbbebf9883cf3ffa2
-
SHA1
3a0bfca5bd5695372d57029a24f99b1ecbefe443
-
SHA256
f121a7a6bec3889cdf928ab386d5115f9485e0df3943f1e7155829254ee13847
-
SHA512
f25f19c0ab53811e4ba0ed2c56359789323375272d3685e698fd330e3a7b21ce0eb84e2f223ddc0125661b536baebb53ce78f6c5e40d1840bff5c4f3f5fe3f9f
-
SSDEEP
768:FdhO/poiiUcjlJInazH9Xqk5nWEZ5SbTDa+WI7CPW59:bw+jjgnYH9XqcnW85SbTPWIV
Malware Config
Extracted
xenorat
0.0.0.0
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
8888
-
startup_name
Windows
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/2512-1-0x0000000000D70000-0x0000000000D82000-memory.dmp family_xenorat behavioral2/files/0x0008000000023c61-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation utthdfgd.exe -
Executes dropped EXE 1 IoCs
pid Process 4616 utthdfgd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utthdfgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utthdfgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1568 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4616 2512 utthdfgd.exe 85 PID 2512 wrote to memory of 4616 2512 utthdfgd.exe 85 PID 2512 wrote to memory of 4616 2512 utthdfgd.exe 85 PID 4616 wrote to memory of 1568 4616 utthdfgd.exe 86 PID 4616 wrote to memory of 1568 4616 utthdfgd.exe 86 PID 4616 wrote to memory of 1568 4616 utthdfgd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\utthdfgd.exe"C:\Users\Admin\AppData\Local\Temp\utthdfgd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\XenoManager\utthdfgd.exe"C:\Users\Admin\AppData\Roaming\XenoManager\utthdfgd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA46E.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD506e85dacdfe730c91184c0fbf263a068
SHA1b4e823bd79b7da585a1d5a606745cba6bb48fb34
SHA256b4c95b80c0d1b208296ec426811c8ccd49f91fcde094efd7df34059a021818c9
SHA5122dc699a530aed67b2162342133e3d76da6190dd2939bba420f775715cdf58d9a15cc2c332a376a770cfca7e50976d0348d116e2d39b0561d39243cc2faf7f153
-
Filesize
45KB
MD5f0fdc0b13c302bedbbebf9883cf3ffa2
SHA13a0bfca5bd5695372d57029a24f99b1ecbefe443
SHA256f121a7a6bec3889cdf928ab386d5115f9485e0df3943f1e7155829254ee13847
SHA512f25f19c0ab53811e4ba0ed2c56359789323375272d3685e698fd330e3a7b21ce0eb84e2f223ddc0125661b536baebb53ce78f6c5e40d1840bff5c4f3f5fe3f9f