Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 01:39
Behavioral task
behavioral1
Sample
BootstrapperNew1.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral2
Sample
BootstrapperNew1.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
BootstrapperNew1.exe
-
Size
50KB
-
MD5
2db839a013bb2742e80cdcf4edc63f39
-
SHA1
8b94a91e13f1ff30a3ca2627d3b43affacbb66b0
-
SHA256
47497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d
-
SHA512
3f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a
-
SSDEEP
768:UdhO/poiiUcjlJIn8aH9Xqk5nWEZ5SbTDaCuI7CPW5ispt:uw+jjgnfH9XqcnW85SbTvuIqspt
Malware Config
Extracted
xenorat
193.161.193.99
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Solara Bootstrapper Dependinces
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/4748-1-0x0000000000760000-0x0000000000772000-memory.dmp family_xenorat behavioral1/files/0x000b000000023cbc-5.dat family_xenorat -
Xenorat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 48 2280 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation BootstrapperNew1.exe -
Executes dropped EXE 1 IoCs
pid Process 3260 BootstrapperNew1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperNew1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2240 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3260 4748 BootstrapperNew1.exe 88 PID 4748 wrote to memory of 3260 4748 BootstrapperNew1.exe 88 PID 4748 wrote to memory of 3260 4748 BootstrapperNew1.exe 88 PID 3260 wrote to memory of 5092 3260 BootstrapperNew1.exe 91 PID 3260 wrote to memory of 5092 3260 BootstrapperNew1.exe 91 PID 3260 wrote to memory of 5092 3260 BootstrapperNew1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew1.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"C:\Users\Admin\AppData\Roaming\XenoManager\BootstrapperNew1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Solara Bootstrapper Dependinces" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7F90.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTY0NjUyNzQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD54f1a3f65c726a5d1b6738fc85f4a9925
SHA1e207b950c2f65eb9e4f59967afefa139748f4a6f
SHA2564820306e4bbf03801fb906ef2fcdd956b9d8a5949870ece25ac21244e3285d93
SHA512fc836daa24cf6245f3fb6261c06e6735925a17149e7297ea4c24b297ea91eb4d9f17d8b090f0e24e970d58ba797498c390735192c5352e32ac88b1312e665339
-
Filesize
50KB
MD52db839a013bb2742e80cdcf4edc63f39
SHA18b94a91e13f1ff30a3ca2627d3b43affacbb66b0
SHA25647497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d
SHA5123f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a