Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 11:54
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
General
-
Target
setup.exe
-
Size
45KB
-
MD5
55015058afbda7560bc25995cd7d18a2
-
SHA1
d48e832259ac210da5529b9074976e3c32d84098
-
SHA256
e4d2d76d8151f045a9229cc69920b48284539abd9b4b0bb039b680b76f9412a4
-
SHA512
7d9e7a610434d3ae09da8f831c88d4a328426ecd21d4d44cfb0430304c0232ef5da5d79faa9870d1ba7977fbd2a5a1ff450200fe98b735902738db11ca662650
-
SSDEEP
768:5dhO/poiiUcjlJInX3H9Xqk5nWEZ5SbTDa2uI7CPW5i:3w+jjgnnH9XqcnW85SbT7uIK
Malware Config
Extracted
xenorat
88.97.165.163
setup
-
delay
5000
-
install_path
appdata
-
port
58035
-
startup_name
run
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3184-1-0x0000000000540000-0x0000000000552000-memory.dmp family_xenorat behavioral2/files/0x000b000000023b8e-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation setup.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3932 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4968 3184 setup.exe 83 PID 3184 wrote to memory of 4968 3184 setup.exe 83 PID 3184 wrote to memory of 4968 3184 setup.exe 83 PID 4968 wrote to memory of 3932 4968 setup.exe 85 PID 4968 wrote to memory of 3932 4968 setup.exe 85 PID 4968 wrote to memory of 3932 4968 setup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"C:\Users\Admin\AppData\Roaming\XenoManager\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "run" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB70B.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD52c5b98de34e8228ece345d2dd14c3943
SHA1fe7cbb38178e1639130e65123028041e9f28608d
SHA256366aab4e56302e176927602e25169babbe9e5680431472db640c35919f9169cd
SHA512e9b5d626c704c548f6f644c065e41d67027a5fc6b5d13cd995d0bac94fcca6aa4b9ae9a2c32d2ef3421b85cfb57c8993239f15b4f13dd894b7beffe748c8c27d
-
Filesize
45KB
MD555015058afbda7560bc25995cd7d18a2
SHA1d48e832259ac210da5529b9074976e3c32d84098
SHA256e4d2d76d8151f045a9229cc69920b48284539abd9b4b0bb039b680b76f9412a4
SHA5127d9e7a610434d3ae09da8f831c88d4a328426ecd21d4d44cfb0430304c0232ef5da5d79faa9870d1ba7977fbd2a5a1ff450200fe98b735902738db11ca662650