Analysis
-
max time kernel
30s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:46
Behavioral task
behavioral1
Sample
slod usable.exe
Resource
win10v2004-20250314-en
General
-
Target
slod usable.exe
-
Size
46KB
-
MD5
08965376a82a70166e291a706646337b
-
SHA1
0f7d89c7048610f162c1a55285f8c9a609b309b7
-
SHA256
c904d34c8b053a058df0e203759164233a8fe527921b3edb883721e02b9184b3
-
SHA512
74db27871b7b67f925da145fbf74bff9cc26552650ad2043dde0b5736e92dbd4aa02982db7b5a43319b889f0ef7918569936d58bbe287f59eac9de0563c73a50
-
SSDEEP
768:fdhO/poiiUcjlJIna6H9Xqk5nWEZ5SbTDauuI7CPW5t:Vw+jjgnVH9XqcnW85SbTruIV
Malware Config
Extracted
xenorat
adminaahliya-20192.portmap.io
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/5836-1-0x0000000000200000-0x0000000000212000-memory.dmp family_xenorat behavioral1/files/0x00070000000242ec-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation slod usable.exe -
Executes dropped EXE 1 IoCs
pid Process 372 slod usable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slod usable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slod usable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1444 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5836 wrote to memory of 372 5836 slod usable.exe 89 PID 5836 wrote to memory of 372 5836 slod usable.exe 89 PID 5836 wrote to memory of 372 5836 slod usable.exe 89 PID 372 wrote to memory of 1444 372 slod usable.exe 94 PID 372 wrote to memory of 1444 372 slod usable.exe 94 PID 372 wrote to memory of 1444 372 slod usable.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\slod usable.exe"C:\Users\Admin\AppData\Local\Temp\slod usable.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5836 -
C:\Users\Admin\AppData\Roaming\XenoManager\slod usable.exe"C:\Users\Admin\AppData\Roaming\XenoManager\slod usable.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp96A2.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD51ea42be075bfac88243e0dc5c36777ba
SHA12bc549b6e49685aa297a53fd6ae50603cd70351d
SHA2562863dea6fa8289013b5d96d1f3e5a1ef6f00aba973b0f09c6a8e10db7a8ffea4
SHA5122e68355321546f3b0694807ccfca50d778173a21e348ea24c93e4cbec285043c57c2917fa082d84bdbde7a414ce1429a975db18a60e366d100741c6bc6a62d43
-
Filesize
46KB
MD508965376a82a70166e291a706646337b
SHA10f7d89c7048610f162c1a55285f8c9a609b309b7
SHA256c904d34c8b053a058df0e203759164233a8fe527921b3edb883721e02b9184b3
SHA51274db27871b7b67f925da145fbf74bff9cc26552650ad2043dde0b5736e92dbd4aa02982db7b5a43319b889f0ef7918569936d58bbe287f59eac9de0563c73a50