Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-12-2024 23:03
General
-
Target
vff.exe
-
Size
45KB
-
MD5
3e857e2fb2793de1f0310d2443088f82
-
SHA1
582b81e67f23a93c713b68d432432aace74c731a
-
SHA256
bc6df9c438db5ef373c33b6c6a16a1dfa70f2d8c66a8352ea1632579225edc76
-
SHA512
4cf910b7fa9bd39ffaab40789c0f896f26f41b5004f0d4434deb50453131a930998a87a8bc2e0383d3dd982fa473f14ff228cff5bbd46cc1a0d0cf79fb97ffbc
-
SSDEEP
768:RdhO/poiiUcjlJInGTwH9Xqk5nWEZ5SbTDa6WI7CPW5p:Pw+jjgnLH9XqcnW85SbTTWIR
Malware Config
Extracted
Family
xenorat
C2
agreement-lists.gl.at.ply.gg
Mutex
skibdiitoilet!zzz
Attributes
-
delay
5000
-
install_path
nothingset
-
port
48889
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/2860-1-0x0000000000700000-0x0000000000712000-memory.dmp family_xenorat behavioral1/memory/2860-6-0x0000000005B40000-0x0000000005B4A000-memory.dmp family_xenorat -
Xenorat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vff.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe 2860 vff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 vff.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2860 wrote to memory of 788 2860 vff.exe 78 PID 2860 wrote to memory of 788 2860 vff.exe 78 PID 2860 wrote to memory of 788 2860 vff.exe 78 PID 2860 wrote to memory of 4132 2860 vff.exe 80 PID 2860 wrote to memory of 4132 2860 vff.exe 80 PID 2860 wrote to memory of 4132 2860 vff.exe 80 PID 4132 wrote to memory of 1500 4132 cmd.exe 82 PID 4132 wrote to memory of 1500 4132 cmd.exe 82 PID 4132 wrote to memory of 1500 4132 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\vff.exe"C:\Users\Admin\AppData\Local\Temp\vff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv2⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\vff.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-