Analysis
-
max time kernel
9s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 23:02
General
-
Target
eulen.exe
-
Size
45KB
-
MD5
5a27794bcc19355cd3bf7b2c1be74390
-
SHA1
513786fdca0daa216233a6ca0a76f5e3eb091e8b
-
SHA256
5ddc9bb25c94d9a41c1c2faaa25f345fe742a9d915326dd028082fbefb1929f9
-
SHA512
694553f6c0310351248323e076d69599a89e996b3977d6f8b253128419c750008609c3b4164c72a686854cbc9232a5655394e394843be77b584238d6373b1cd1
-
SSDEEP
768:WdhO/poiiUcjlJInJ4yH9Xqk5nWEZ5SbTDaqqWI7CPW5t:Aw+jjgneyH9XqcnW85SbTBqWIl
Malware Config
Extracted
xenorat
147.185.221.25
Eulen
-
delay
5000
-
install_path
temp
-
port
18889
-
startup_name
Update
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/1332-1-0x0000000000290000-0x00000000002A2000-memory.dmp family_xenorat behavioral1/files/0x0007000000023c9b-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation eulen.exe -
Executes dropped EXE 1 IoCs
pid Process 408 eulen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eulen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eulen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2172 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1332 wrote to memory of 408 1332 eulen.exe 83 PID 1332 wrote to memory of 408 1332 eulen.exe 83 PID 1332 wrote to memory of 408 1332 eulen.exe 83 PID 408 wrote to memory of 2172 408 eulen.exe 85 PID 408 wrote to memory of 2172 408 eulen.exe 85 PID 408 wrote to memory of 2172 408 eulen.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eulen.exe"C:\Users\Admin\AppData\Local\Temp\eulen.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\eulen.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\eulen.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Update" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAF2C.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD55a27794bcc19355cd3bf7b2c1be74390
SHA1513786fdca0daa216233a6ca0a76f5e3eb091e8b
SHA2565ddc9bb25c94d9a41c1c2faaa25f345fe742a9d915326dd028082fbefb1929f9
SHA512694553f6c0310351248323e076d69599a89e996b3977d6f8b253128419c750008609c3b4164c72a686854cbc9232a5655394e394843be77b584238d6373b1cd1
-
Filesize
1KB
MD589dc616a1bd6468611d1519a7a59cc6a
SHA1ad4a7de6aa7c8b03f4b900ca306c8885f44adf58
SHA256c98cf4e9c0641617e4df28ce0a0f294939fa0027c14d18d6952d1c6a5f84282c
SHA512b1e39c66cfac7da9b2adb1051e4b64f8ae0f2f35cddcb5e0852ae0e9d6448ecde519a466e4a229669c1de7bf49c4ff3ad59fbbe0b370ad908e7d31b3141ef017