Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 14:08
Behavioral task
behavioral1
Sample
Efispoofer.exe
Resource
win7-20241010-en
General
-
Target
Efispoofer.exe
-
Size
45KB
-
MD5
55bac6044a43294a4245b7be4ad63b9d
-
SHA1
30543a9f6d5639795e44e8c50cc8559c43868a72
-
SHA256
6040e8977f1e45d07a64a0c3826b3d66bdd8d70c1207c151f19bc759c3533996
-
SHA512
761548c5f1b379686c87dab2176fa9ca0f2ba4f34e7943b95210a0c8f835e254788fa41d61fde8318d8314330c73ed3f8ea6bb77e6b981dacafeab1a19caf988
-
SSDEEP
768:FdhO/poiiUcjlJIn+YH9Xqk5nWEZ5SbTDakuI7CPW5j:bw+jjgnrH9XqcnW85SbTBuIL
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/2608-1-0x0000000001250000-0x0000000001262000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efispoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2904 2608 Efispoofer.exe 30 PID 2608 wrote to memory of 2904 2608 Efispoofer.exe 30 PID 2608 wrote to memory of 2904 2608 Efispoofer.exe 30 PID 2608 wrote to memory of 2904 2608 Efispoofer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Efispoofer.exe"C:\Users\Admin\AppData\Local\Temp\Efispoofer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3276.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58eff97808798567d181694b6b11e8822
SHA138edc6b6d79a12a1fc90c569bc152006c802dc56
SHA2566b1bb3e3f89d423ea9d054ca7862fe1335d5a9fd575a4b25bfc61ceba48e6ad9
SHA512a9c216678fb2588872461b269430d6bb58b7509d226b992e1596f854f65b945c3522e751f972ddf208f759a49e9eb74d515f4583ef3631653591c58fe0e65fd2