Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 14:25
Behavioral task
behavioral1
Sample
niggers.exe
Resource
win7-20240708-en
General
-
Target
niggers.exe
-
Size
45KB
-
MD5
ae22d8f92efa607adc88410cff6e5d73
-
SHA1
69ae5beea80c2e3fd4077311f7c5b2f9076e4125
-
SHA256
c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae
-
SHA512
507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29
-
SSDEEP
768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnAH9XqcnW85SbTTWI3
Malware Config
Extracted
xenorat
192.168.1.145
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/4860-1-0x0000000000620000-0x0000000000632000-memory.dmp family_xenorat behavioral2/files/0x0008000000023bc3-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggers.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 niggers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4700 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4860 wrote to memory of 5060 4860 niggers.exe 84 PID 4860 wrote to memory of 5060 4860 niggers.exe 84 PID 4860 wrote to memory of 5060 4860 niggers.exe 84 PID 5060 wrote to memory of 4700 5060 niggers.exe 87 PID 5060 wrote to memory of 4700 5060 niggers.exe 87 PID 5060 wrote to memory of 4700 5060 niggers.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggers.exe"C:\Users\Admin\AppData\Local\Temp\niggers.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\niggers.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\niggers.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Efi spoofer auto spoof" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD62C.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5ae22d8f92efa607adc88410cff6e5d73
SHA169ae5beea80c2e3fd4077311f7c5b2f9076e4125
SHA256c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae
SHA512507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29
-
Filesize
1KB
MD586bf91879a6f62ddc4cf5cf7aca7dd85
SHA11d937678cec65170e066f15c7288b21c0705217c
SHA2566cab922e698c1cd8aec47033119c71a90969df028dec2d902bcdbbb2ced9f5bb
SHA5128f99b14c5bcb5a48ab1329cf58df7c3ec556d27e3ffc7a36e08d0d3007d730cb9f06a84e5431e5a92989ad23dbc73cbd03c2411935e2b8cf1974a7804021f52f