Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 12:13
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
General
-
Target
loader.exe
-
Size
45KB
-
MD5
9bcea0087c56e3d6ae3b40332c44e6cd
-
SHA1
61cc52ec9d192706016b0eb2ebe8da3ccee490a7
-
SHA256
ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
-
SHA512
a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672
-
SSDEEP
768:6dhO/poiiUcjlJIn63H9Xqk5nWEZ5SbTDatuI7CPW5z:cw+jjgnkH9XqcnW85SbTYuIL
Malware Config
Extracted
xenorat
127.0.0.1
Loader
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
loader
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3180-1-0x0000000000AA0000-0x0000000000AB2000-memory.dmp family_xenorat behavioral2/files/0x0008000000023cb2-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation loader.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4652 3180 loader.exe 82 PID 3180 wrote to memory of 4652 3180 loader.exe 82 PID 3180 wrote to memory of 4652 3180 loader.exe 82 PID 4652 wrote to memory of 1508 4652 loader.exe 85 PID 4652 wrote to memory of 1508 4652 loader.exe 85 PID 4652 wrote to memory of 1508 4652 loader.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Roaming\XenoManager\loader.exe"C:\Users\Admin\AppData\Roaming\XenoManager\loader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "loader" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD86.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD506127a997b55b3321cbd0434a1fb3e73
SHA1ad0d799b0419387002fd7481ceec6dbad8a33a11
SHA2569ac39a424121ac325240b02d49e0ab3f83679614d85d2157c0aa62bd1a7ca043
SHA51298242547e5c0c57af37a8e11e0544b497866a67f48c06d6cfe03a26b898eff29bad375b0b559c6f06da4c44a9e8d678308a0f4f2178014ec08e119411030cb8f
-
Filesize
45KB
MD59bcea0087c56e3d6ae3b40332c44e6cd
SHA161cc52ec9d192706016b0eb2ebe8da3ccee490a7
SHA256ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
SHA512a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672