Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 23:01
Behavioral task
behavioral1
Sample
test11.exe
Resource
win7-20241010-en
General
-
Target
test11.exe
-
Size
60KB
-
MD5
b17514c767f1f62dbcb166a0c6ec326c
-
SHA1
482eb69bb070a338368a9bb130a610b3af61cc16
-
SHA256
014d0e20da8e4c3b6b83dc594bd0cb57e5419c3eab5b075d85ce648d825fcff8
-
SHA512
f6d3cd10037d4e1a79cd4ef0aec41beb3a66d04cd1ed9131ac61adbafc959f98a2279ec8c2c22fcd0a59274600ecd4645915db418faad635bd6ead8578a15243
-
SSDEEP
768:1dhO/poiiUcjlJIn42gH9Xqk5nWEZ5SbTDaWuI7CPW5xqE:Lw+jjgn4LH9XqcnW85SbTDuI4E
Malware Config
Extracted
xenorat
127.0.0.1
set_up_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
SecurityHealthSystray
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2052-1-0x0000000000060000-0x0000000000076000-memory.dmp family_xenorat behavioral1/files/0x000700000001930d-8.dat family_xenorat behavioral1/memory/2472-9-0x00000000001A0000-0x00000000001B6000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2472 test11.exe -
Loads dropped DLL 1 IoCs
pid Process 2052 test11.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2052 wrote to memory of 2472 2052 test11.exe 30 PID 2472 wrote to memory of 2124 2472 test11.exe 31 PID 2472 wrote to memory of 2124 2472 test11.exe 31 PID 2472 wrote to memory of 2124 2472 test11.exe 31 PID 2472 wrote to memory of 2124 2472 test11.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\test11.exe"C:\Users\Admin\AppData\Local\Temp\test11.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\test11.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\test11.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SecurityHealthSystray" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB951.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b17514c767f1f62dbcb166a0c6ec326c
SHA1482eb69bb070a338368a9bb130a610b3af61cc16
SHA256014d0e20da8e4c3b6b83dc594bd0cb57e5419c3eab5b075d85ce648d825fcff8
SHA512f6d3cd10037d4e1a79cd4ef0aec41beb3a66d04cd1ed9131ac61adbafc959f98a2279ec8c2c22fcd0a59274600ecd4645915db418faad635bd6ead8578a15243
-
Filesize
1KB
MD500b2ac135eb2a2a01756c263048ad49d
SHA16f532cb1deb42bd07edebe7016951990fb84df5e
SHA2567b79b809b0523db9465f64520c7ba243b734ad2d542983ca5588afc7511edc6b
SHA5128242f4950e7ff50f99a7f13249625b8aa92b38d2ceb652e998d20e72b07346a1dc377bb0e30e005aac60a7adb2e94d19ffea9d4579425d5b3463ff3d7b489fb8