Analysis
-
max time kernel
58s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:44
Behavioral task
behavioral1
Sample
skid.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
skid.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
skid.exe
-
Size
46KB
-
MD5
b61b5c0bff0b8923d7457866ff3ddf4e
-
SHA1
dbe578aee200e3665053801d93447e3e98e6c75a
-
SHA256
5c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
-
SHA512
624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c
-
SSDEEP
768:7dhO/poiiUcjlJInWa3H9Xqk5nWEZ5SbTDaTuI7CPW5h:pw+jjgnzH9XqcnW85SbTWuIZ
Malware Config
Extracted
xenorat
tcp://adminaahliya-20192.portmap.io
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/4676-1-0x00000000009F0000-0x0000000000A02000-memory.dmp family_xenorat behavioral1/files/0x00070000000242e0-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation skid.exe -
Executes dropped EXE 1 IoCs
pid Process 5568 skid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5720 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4676 wrote to memory of 5568 4676 skid.exe 88 PID 4676 wrote to memory of 5568 4676 skid.exe 88 PID 4676 wrote to memory of 5568 4676 skid.exe 88 PID 5568 wrote to memory of 5720 5568 skid.exe 97 PID 5568 wrote to memory of 5720 5568 skid.exe 97 PID 5568 wrote to memory of 5720 5568 skid.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\skid.exe"C:\Users\Admin\AppData\Local\Temp\skid.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB18D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5d89f4aa7e4cfce19576f43fb3b7ceba3
SHA1e9b886c7ad800b336c89ae5811b2b88e33f71b7d
SHA2568a557a8adbf66bcc8538c7695fa29b9d232c93c7b16107ff36df3571ff2a0311
SHA512f7bd4699746b467d9ef9033752af7a4a26510ba3f85af5e8774aa140eb91fc3da1f1c2b8b70e387abd9d1ee1d195ff7a9e8fb24272c2df702ca416a190b31954
-
Filesize
46KB
MD5b61b5c0bff0b8923d7457866ff3ddf4e
SHA1dbe578aee200e3665053801d93447e3e98e6c75a
SHA2565c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
SHA512624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c