Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 15:59
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
General
-
Target
test.exe
-
Size
45KB
-
MD5
1e05557defdc34b585d6cc8505321bd6
-
SHA1
d4ba25063f8967f12681cff8016bb88f479c1bbe
-
SHA256
18f165749ec85eaf6eb5dd7560d2e735f43a25efab54b5098b8239349ed43fc1
-
SHA512
b7e5a0fd7e63c5b18beb938f6395aaad233eae1b46023e85fee807cad5d503645770fd942e12b7467aa9236e372ec1e496dd2a935fb4d3cd423bec882ccf4eb5
-
SSDEEP
768:ZdhO/poiiUcjlJInngH9Xqk5nWEZ5SbTDaYuI7CPW5I:Xw+jjgngH9XqcnW85SbT9uIA
Malware Config
Extracted
xenorat
numbers-insights.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
52152
-
startup_name
cool
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/2112-1-0x00000000002D0000-0x00000000002E2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2480 2112 test.exe 31 PID 2112 wrote to memory of 2480 2112 test.exe 31 PID 2112 wrote to memory of 2480 2112 test.exe 31 PID 2112 wrote to memory of 2480 2112 test.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "cool" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCDE9.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5861db5e2028bd0b60030d6659d265f7a
SHA1710ead100e3c494416662050a3f404b1105f04d8
SHA25643373690036af962d0a7449df979bfabb3f5fab84764a4b6b6df5ad8aec13b8f
SHA512c523733d5e5d3cdb9dc7bb326ec4c3a05bf967b540faaa365b5139958d206a83bada70fd19c5dd2bc2f4e4099851811a3a2e8346804ee136fe7d3f45328be9e1