Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 14:25
Behavioral task
behavioral1
Sample
niggers.exe
Resource
win7-20240708-en
General
-
Target
niggers.exe
-
Size
45KB
-
MD5
ae22d8f92efa607adc88410cff6e5d73
-
SHA1
69ae5beea80c2e3fd4077311f7c5b2f9076e4125
-
SHA256
c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae
-
SHA512
507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29
-
SSDEEP
768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnAH9XqcnW85SbTTWI3
Malware Config
Extracted
xenorat
192.168.1.145
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/2696-1-0x0000000000930000-0x0000000000942000-memory.dmp family_xenorat behavioral1/files/0x0008000000016c7c-7.dat family_xenorat behavioral1/memory/1856-9-0x0000000000C40000-0x0000000000C52000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 1856 niggers.exe -
Loads dropped DLL 1 IoCs
pid Process 2696 niggers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2752 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1856 2696 niggers.exe 30 PID 2696 wrote to memory of 1856 2696 niggers.exe 30 PID 2696 wrote to memory of 1856 2696 niggers.exe 30 PID 2696 wrote to memory of 1856 2696 niggers.exe 30 PID 1856 wrote to memory of 2752 1856 niggers.exe 31 PID 1856 wrote to memory of 2752 1856 niggers.exe 31 PID 1856 wrote to memory of 2752 1856 niggers.exe 31 PID 1856 wrote to memory of 2752 1856 niggers.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggers.exe"C:\Users\Admin\AppData\Local\Temp\niggers.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\niggers.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\niggers.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9AAA.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5ae22d8f92efa607adc88410cff6e5d73
SHA169ae5beea80c2e3fd4077311f7c5b2f9076e4125
SHA256c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae
SHA512507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29
-
Filesize
1KB
MD586bf91879a6f62ddc4cf5cf7aca7dd85
SHA11d937678cec65170e066f15c7288b21c0705217c
SHA2566cab922e698c1cd8aec47033119c71a90969df028dec2d902bcdbbb2ced9f5bb
SHA5128f99b14c5bcb5a48ab1329cf58df7c3ec556d27e3ffc7a36e08d0d3007d730cb9f06a84e5431e5a92989ad23dbc73cbd03c2411935e2b8cf1974a7804021f52f