Analysis
-
max time kernel
59s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/03/2025, 15:44
Behavioral task
behavioral1
Sample
skid.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
skid.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
skid.exe
-
Size
46KB
-
MD5
b61b5c0bff0b8923d7457866ff3ddf4e
-
SHA1
dbe578aee200e3665053801d93447e3e98e6c75a
-
SHA256
5c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
-
SHA512
624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c
-
SSDEEP
768:7dhO/poiiUcjlJInWa3H9Xqk5nWEZ5SbTDaTuI7CPW5h:pw+jjgnzH9XqcnW85SbTWuIZ
Malware Config
Extracted
xenorat
tcp://adminaahliya-20192.portmap.io
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral3/memory/1972-1-0x0000000000F70000-0x0000000000F82000-memory.dmp family_xenorat behavioral3/files/0x002500000002b054-6.dat family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2876 skid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skid.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4904 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2876 1972 skid.exe 82 PID 1972 wrote to memory of 2876 1972 skid.exe 82 PID 1972 wrote to memory of 2876 1972 skid.exe 82 PID 2876 wrote to memory of 4904 2876 skid.exe 84 PID 2876 wrote to memory of 4904 2876 skid.exe 84 PID 2876 wrote to memory of 4904 2876 skid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\skid.exe"C:\Users\Admin\AppData\Local\Temp\skid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"C:\Users\Admin\AppData\Roaming\XenoManager\skid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7762.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD5d89f4aa7e4cfce19576f43fb3b7ceba3
SHA1e9b886c7ad800b336c89ae5811b2b88e33f71b7d
SHA2568a557a8adbf66bcc8538c7695fa29b9d232c93c7b16107ff36df3571ff2a0311
SHA512f7bd4699746b467d9ef9033752af7a4a26510ba3f85af5e8774aa140eb91fc3da1f1c2b8b70e387abd9d1ee1d195ff7a9e8fb24272c2df702ca416a190b31954
-
Filesize
46KB
MD5b61b5c0bff0b8923d7457866ff3ddf4e
SHA1dbe578aee200e3665053801d93447e3e98e6c75a
SHA2565c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930
SHA512624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c