Analysis
-
max time kernel
47s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 11:37
Errors
General
-
Target
nigga134.exe
-
Size
45KB
-
MD5
5e915d8b490472076ea76b8e5692a4c5
-
SHA1
72dce81720b56ece290b74a1d1be48026f80a5ae
-
SHA256
36fafa54e8346088a77ee47c02b2932841dc8b18e9cabd82fd94f1395bfb6840
-
SHA512
6a3c8960f4436c7d5772978c7c22f6d3cbb59efd4259b97f32175b7a42ee56a6ec9a9a980aa63a9af47a301ff36b503e9f4aa1af7167c2e99ebf9a66397b89de
-
SSDEEP
768:KdhO/poiiUcjlJInUA3H9Xqk5nWEZ5SbTDajuI7CPW55:sw+jjgnfH9XqcnW85SbTuuIh
Malware Config
Extracted
xenorat
147.185.221.24
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
42627
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 4 IoCs
resource yara_rule behavioral1/memory/4432-1-0x0000000000780000-0x0000000000792000-memory.dmp family_xenorat behavioral1/memory/4432-6-0x00000000059C0000-0x00000000059CA000-memory.dmp family_xenorat behavioral1/memory/4432-7-0x00000000055F0000-0x00000000055FC000-memory.dmp family_xenorat behavioral1/memory/4432-13-0x00000000059E0000-0x00000000059EA000-memory.dmp family_xenorat -
Xenorat family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigga134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigga134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2036 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe 4432 nigga134.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4432 nigga134.exe Token: SeDebugPrivilege 2036 taskkill.exe Token: SeDebugPrivilege 1412 nigga134.exe Token: SeShutdownPrivilege 4432 nigga134.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4432 nigga134.exe 4432 nigga134.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4432 wrote to memory of 1444 4432 nigga134.exe 102 PID 4432 wrote to memory of 1444 4432 nigga134.exe 102 PID 4432 wrote to memory of 1444 4432 nigga134.exe 102 PID 5036 wrote to memory of 1452 5036 DllHost.exe 106 PID 5036 wrote to memory of 1452 5036 DllHost.exe 106 PID 5036 wrote to memory of 1452 5036 DllHost.exe 106 PID 1452 wrote to memory of 1412 1452 cmd.exe 108 PID 1452 wrote to memory of 1412 1452 cmd.exe 108 PID 1452 wrote to memory of 1412 1452 cmd.exe 108 PID 5036 wrote to memory of 2036 5036 DllHost.exe 109 PID 5036 wrote to memory of 2036 5036 DllHost.exe 109 PID 5036 wrote to memory of 2036 5036 DllHost.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\nigga134.exe"C:\Users\Admin\AppData\Local\Temp\nigga134.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\windows\temp\msjkhn5f.inf2⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\nigga134.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\nigga134.exe"C:\Users\Admin\AppData\Local\Temp\nigga134.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633B
MD5c88561f592d82a2b9cb0aeef95282083
SHA10cba2e7898ada44cf120ecfff73afb172fc4702e
SHA256c84af7028ce34f4f96b56ee92e755cb2e45907c8a2419fc32f7f9542cb86e915
SHA512a14e2c2afb72f7c7b3fcb7e1042db73b0ea63d81e602eb0713b07f44a87473dac36d3f0281b148de9b2db60fd9fddaa1f8759c696afb7bc04358e6fd2333704b