Analysis
-
max time kernel
298s -
max time network
208s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-12-2024 12:06
General
-
Target
loader.exe
-
Size
45KB
-
MD5
9bcea0087c56e3d6ae3b40332c44e6cd
-
SHA1
61cc52ec9d192706016b0eb2ebe8da3ccee490a7
-
SHA256
ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
-
SHA512
a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672
-
SSDEEP
768:6dhO/poiiUcjlJIn63H9Xqk5nWEZ5SbTDatuI7CPW5z:cw+jjgnkH9XqcnW85SbTYuIL
Malware Config
Extracted
xenorat
127.0.0.1
Loader
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
loader
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/1544-1-0x0000000000010000-0x0000000000022000-memory.dmp family_xenorat behavioral1/files/0x002800000004612a-2.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation loader.exe -
Executes dropped EXE 1 IoCs
pid Process 3792 loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4680 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3792 1544 loader.exe 82 PID 1544 wrote to memory of 3792 1544 loader.exe 82 PID 1544 wrote to memory of 3792 1544 loader.exe 82 PID 3792 wrote to memory of 4680 3792 loader.exe 87 PID 3792 wrote to memory of 4680 3792 loader.exe 87 PID 3792 wrote to memory of 4680 3792 loader.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\XenoManager\loader.exe"C:\Users\Admin\AppData\Roaming\XenoManager\loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "loader" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FDE.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
1KB
MD506127a997b55b3321cbd0434a1fb3e73
SHA1ad0d799b0419387002fd7481ceec6dbad8a33a11
SHA2569ac39a424121ac325240b02d49e0ab3f83679614d85d2157c0aa62bd1a7ca043
SHA51298242547e5c0c57af37a8e11e0544b497866a67f48c06d6cfe03a26b898eff29bad375b0b559c6f06da4c44a9e8d678308a0f4f2178014ec08e119411030cb8f
-
Filesize
45KB
MD59bcea0087c56e3d6ae3b40332c44e6cd
SHA161cc52ec9d192706016b0eb2ebe8da3ccee490a7
SHA256ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
SHA512a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672