Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 14:05
Behavioral task
behavioral1
Sample
Efi spoofer.exe
Resource
win7-20241023-en
General
-
Target
Efi spoofer.exe
-
Size
45KB
-
MD5
55bac6044a43294a4245b7be4ad63b9d
-
SHA1
30543a9f6d5639795e44e8c50cc8559c43868a72
-
SHA256
6040e8977f1e45d07a64a0c3826b3d66bdd8d70c1207c151f19bc759c3533996
-
SHA512
761548c5f1b379686c87dab2176fa9ca0f2ba4f34e7943b95210a0c8f835e254788fa41d61fde8318d8314330c73ed3f8ea6bb77e6b981dacafeab1a19caf988
-
SSDEEP
768:FdhO/poiiUcjlJIn+YH9Xqk5nWEZ5SbTDakuI7CPW5j:bw+jjgnrH9XqcnW85SbTBuIL
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/2100-1-0x00000000008D0000-0x00000000008E2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efi spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3008 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3008 2100 Efi spoofer.exe 30 PID 2100 wrote to memory of 3008 2100 Efi spoofer.exe 30 PID 2100 wrote to memory of 3008 2100 Efi spoofer.exe 30 PID 2100 wrote to memory of 3008 2100 Efi spoofer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Efi spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Efi spoofer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB06B.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58e62f5a2def2179999e69556a6a7e7eb
SHA17ac12efc543258969b7fb81dbc04f7a4497eed5e
SHA256be7331e94e3b4ab4f48e2a7eca3387ba505697249ae73b8d5cf33ab243e5fa70
SHA512fbf014fe65e88b98afea8a5ced0f69c09f930f69478a5f0bbd51fd8516a264266f8b18cb23a6f7c0aef49a9b4be1759a97cddb27aa5d34efdf7bc5e5d3092f6d