Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 14:20
Behavioral task
behavioral1
Sample
f.exe
Resource
win7-20240708-en
General
-
Target
f.exe
-
Size
45KB
-
MD5
2ac2b9c31f795821a2f34fce2b970847
-
SHA1
e9e3d2b81ea332a239b991419b1bba217d90a193
-
SHA256
b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
-
SHA512
eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037
-
SSDEEP
768:5dhO/poiiUcjlJIn7JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnFH9XqcnW85SbTTWI3
Malware Config
Extracted
xenorat
192.168.1.145
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4684
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2080-1-0x00000000013B0000-0x00000000013C2000-memory.dmp family_xenorat behavioral1/files/0x0008000000016c03-4.dat family_xenorat behavioral1/memory/2856-9-0x00000000000D0000-0x00000000000E2000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2856 f.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2856 2080 f.exe 30 PID 2080 wrote to memory of 2856 2080 f.exe 30 PID 2080 wrote to memory of 2856 2080 f.exe 30 PID 2080 wrote to memory of 2856 2080 f.exe 30 PID 2856 wrote to memory of 2580 2856 f.exe 31 PID 2856 wrote to memory of 2580 2856 f.exe 31 PID 2856 wrote to memory of 2580 2856 f.exe 31 PID 2856 wrote to memory of 2580 2856 f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f.exe"C:\Users\Admin\AppData\Local\Temp\f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmp34A7.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58bf10595ec845b804aadb17739e90ba7
SHA1a326324e0302e3cc348c966e76e55c79d50307a7
SHA256cdcafe1b4e6746d3222be87675e246716d49a25d7a7c8e8043d4e246a6096fd9
SHA512e10183dd6a4a2d8b9189b85a12d6cf6f59d71165524259bc9ad126eca670f55f35b0cd6ab28b7ca747c8bfa3366b66fcf16439ebb1efd1575baffbc78182841d
-
Filesize
45KB
MD52ac2b9c31f795821a2f34fce2b970847
SHA1e9e3d2b81ea332a239b991419b1bba217d90a193
SHA256b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
SHA512eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037