Analysis
-
max time kernel
59s -
max time network
48s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 15:44
Behavioral task
behavioral1
Sample
skid.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
skid.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
skid.exe
-
Size
46KB
-
MD5
b61b5c0bff0b8923d7457866ff3ddf4e
-
SHA1
dbe578aee200e3665053801d93447e3e98e6c75a
-
SHA256
5c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
-
SHA512
624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c
-
SSDEEP
768:7dhO/poiiUcjlJInWa3H9Xqk5nWEZ5SbTDaTuI7CPW5h:pw+jjgnzH9XqcnW85SbTWuIZ
Malware Config
Extracted
xenorat
tcp://adminaahliya-20192.portmap.io
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/2464-1-0x00000000008E0000-0x00000000008F2000-memory.dmp family_xenorat behavioral2/files/0x000e000000027dac-2.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Control Panel\International\Geo\Nation skid.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 skid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1152 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2084 2464 skid.exe 82 PID 2464 wrote to memory of 2084 2464 skid.exe 82 PID 2464 wrote to memory of 2084 2464 skid.exe 82 PID 2084 wrote to memory of 1152 2084 skid.exe 87 PID 2084 wrote to memory of 1152 2084 skid.exe 87 PID 2084 wrote to memory of 1152 2084 skid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\skid.exe"C:\Users\Admin\AppData\Local\Temp\skid.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD35D.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD566aea5e724c4a224d092067c3381783b
SHA1ee3cc64c4370a255391bdfeef2883d5b7a6e6230
SHA25604b17cab961f973464bba8924f764edef6451d1774f2405d27ef33d164296923
SHA5125d719e303f491d1443cb7c7e8946481e90532522a422c98f82466e1eddcd1ef24a4505dcbf75f2191fbb66825d3550566d7f408a3854edeb4c1a192c8c9a6d06
-
Filesize
1KB
MD5d89f4aa7e4cfce19576f43fb3b7ceba3
SHA1e9b886c7ad800b336c89ae5811b2b88e33f71b7d
SHA2568a557a8adbf66bcc8538c7695fa29b9d232c93c7b16107ff36df3571ff2a0311
SHA512f7bd4699746b467d9ef9033752af7a4a26510ba3f85af5e8774aa140eb91fc3da1f1c2b8b70e387abd9d1ee1d195ff7a9e8fb24272c2df702ca416a190b31954
-
Filesize
46KB
MD5b61b5c0bff0b8923d7457866ff3ddf4e
SHA1dbe578aee200e3665053801d93447e3e98e6c75a
SHA2565c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
SHA512624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c