Analysis
-
max time kernel
47s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:04
Behavioral task
behavioral1
Sample
sigmacode.exe
Resource
win10v2004-20250314-en
General
-
Target
sigmacode.exe
-
Size
45KB
-
MD5
4fbef0899b35ae09ba0d601cba569e54
-
SHA1
49e1f7939dc5ad245a26f5c5762bec1d4730f797
-
SHA256
3f2a0056e6fe0575d5823732d1e4549ee0c3cf9d196637b8589a0432a46f59e7
-
SHA512
bcd3ae5fb14bf7f3d49520afa00c47360ddd178bbc1b8fb8490b18280495a708efc23afb6b08693c71b7cad410b6241cf545448103d0afaf9c649806376b5908
-
SSDEEP
768:KdhO/poiiUcjlJInvbqmH9Xqk5nWEZ5SbTDaxWI7CPW5h:sw+jjgnzH9XqcnW85SbTgWIZ
Malware Config
Extracted
xenorat
issue-vernon.gl.at.ply.gg
deptrainhatvutru
-
delay
5000
-
install_path
nothingset
-
port
7560
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral1/memory/4680-1-0x0000000000B80000-0x0000000000B92000-memory.dmp family_xenorat behavioral1/memory/4680-6-0x0000000006030000-0x000000000603A000-memory.dmp family_xenorat behavioral1/memory/4680-9-0x00000000071A0000-0x000000000729A000-memory.dmp family_xenorat -
Xenorat family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sigmacode.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe 4680 sigmacode.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4680 sigmacode.exe