Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 17:53
Behavioral task
behavioral1
Sample
wave.exe
Resource
win7-20241010-en
General
-
Target
wave.exe
-
Size
121KB
-
MD5
0c8d27584306ac7ca56b6642847c83f1
-
SHA1
a5be54c39b1ee1a173f0b78966b52de9f661c715
-
SHA256
803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c
-
SHA512
1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831
-
SSDEEP
3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
7276
-
startup_name
wave
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/3440-1-0x0000000000D30000-0x0000000000D54000-memory.dmp family_xenorat behavioral2/files/0x000c000000023b79-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wave.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 wave.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wave.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wave.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2200 3440 wave.exe 82 PID 3440 wrote to memory of 2200 3440 wave.exe 82 PID 3440 wrote to memory of 2200 3440 wave.exe 82 PID 2200 wrote to memory of 2204 2200 wave.exe 83 PID 2200 wrote to memory of 2204 2200 wave.exe 83 PID 2200 wrote to memory of 2204 2200 wave.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\wave.exe"C:\Users\Admin\AppData\Local\Temp\wave.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Roaming\XenoManager\wave.exe"C:\Users\Admin\AppData\Roaming\XenoManager\wave.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "wave" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBB9F.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD54a1e997a03387cfa23e02393da12a6a3
SHA1e382c9fff7ae66fe39107e9ef975226a9d087423
SHA25699a399d99f09fa11bcbe7ac3ce5953d3d913699806998e58d7f0e0763bd3a65d
SHA5121a5efbd3a2674a8a0d199c363a3eabd5dd109ac103e99ac6514313ac87337237749de91c93483de67550850747ad7601958a364beca51ad73e23c86490519305
-
Filesize
121KB
MD50c8d27584306ac7ca56b6642847c83f1
SHA1a5be54c39b1ee1a173f0b78966b52de9f661c715
SHA256803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c
SHA5121628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831