Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 14:20
Behavioral task
behavioral1
Sample
f.exe
Resource
win7-20240708-en
General
-
Target
f.exe
-
Size
45KB
-
MD5
2ac2b9c31f795821a2f34fce2b970847
-
SHA1
e9e3d2b81ea332a239b991419b1bba217d90a193
-
SHA256
b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
-
SHA512
eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037
-
SSDEEP
768:5dhO/poiiUcjlJIn7JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnFH9XqcnW85SbTTWI3
Malware Config
Extracted
xenorat
192.168.1.145
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4684
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3760-1-0x0000000000FE0000-0x0000000000FF2000-memory.dmp family_xenorat behavioral2/files/0x0007000000023c85-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation f.exe -
Executes dropped EXE 1 IoCs
pid Process 5004 f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4752 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3760 wrote to memory of 5004 3760 f.exe 85 PID 3760 wrote to memory of 5004 3760 f.exe 85 PID 3760 wrote to memory of 5004 3760 f.exe 85 PID 5004 wrote to memory of 4752 5004 f.exe 87 PID 5004 wrote to memory of 4752 5004 f.exe 87 PID 5004 wrote to memory of 4752 5004 f.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f.exe"C:\Users\Admin\AppData\Local\Temp\f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\f.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\f.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAC8C.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD52ac2b9c31f795821a2f34fce2b970847
SHA1e9e3d2b81ea332a239b991419b1bba217d90a193
SHA256b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
SHA512eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037
-
Filesize
1KB
MD58bf10595ec845b804aadb17739e90ba7
SHA1a326324e0302e3cc348c966e76e55c79d50307a7
SHA256cdcafe1b4e6746d3222be87675e246716d49a25d7a7c8e8043d4e246a6096fd9
SHA512e10183dd6a4a2d8b9189b85a12d6cf6f59d71165524259bc9ad126eca670f55f35b0cd6ab28b7ca747c8bfa3366b66fcf16439ebb1efd1575baffbc78182841d