Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 11:54
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
General
-
Target
setup.exe
-
Size
45KB
-
MD5
55015058afbda7560bc25995cd7d18a2
-
SHA1
d48e832259ac210da5529b9074976e3c32d84098
-
SHA256
e4d2d76d8151f045a9229cc69920b48284539abd9b4b0bb039b680b76f9412a4
-
SHA512
7d9e7a610434d3ae09da8f831c88d4a328426ecd21d4d44cfb0430304c0232ef5da5d79faa9870d1ba7977fbd2a5a1ff450200fe98b735902738db11ca662650
-
SSDEEP
768:5dhO/poiiUcjlJInX3H9Xqk5nWEZ5SbTDa2uI7CPW5i:3w+jjgnnH9XqcnW85SbT7uIK
Malware Config
Extracted
xenorat
88.97.165.163
setup
-
delay
5000
-
install_path
appdata
-
port
58035
-
startup_name
run
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2724-1-0x0000000000980000-0x0000000000992000-memory.dmp family_xenorat behavioral1/files/0x0008000000015d75-4.dat family_xenorat behavioral1/memory/2828-9-0x0000000001290000-0x00000000012A2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2828 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2724 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2724 wrote to memory of 2828 2724 setup.exe 30 PID 2828 wrote to memory of 2628 2828 setup.exe 31 PID 2828 wrote to memory of 2628 2828 setup.exe 31 PID 2828 wrote to memory of 2628 2828 setup.exe 31 PID 2828 wrote to memory of 2628 2828 setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "run" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7704.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52c5b98de34e8228ece345d2dd14c3943
SHA1fe7cbb38178e1639130e65123028041e9f28608d
SHA256366aab4e56302e176927602e25169babbe9e5680431472db640c35919f9169cd
SHA512e9b5d626c704c548f6f644c065e41d67027a5fc6b5d13cd995d0bac94fcca6aa4b9ae9a2c32d2ef3421b85cfb57c8993239f15b4f13dd894b7beffe748c8c27d
-
Filesize
45KB
MD555015058afbda7560bc25995cd7d18a2
SHA1d48e832259ac210da5529b9074976e3c32d84098
SHA256e4d2d76d8151f045a9229cc69920b48284539abd9b4b0bb039b680b76f9412a4
SHA5127d9e7a610434d3ae09da8f831c88d4a328426ecd21d4d44cfb0430304c0232ef5da5d79faa9870d1ba7977fbd2a5a1ff450200fe98b735902738db11ca662650