Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:52
General
-
Target
slodusable.exe
-
Size
46KB
-
MD5
08965376a82a70166e291a706646337b
-
SHA1
0f7d89c7048610f162c1a55285f8c9a609b309b7
-
SHA256
c904d34c8b053a058df0e203759164233a8fe527921b3edb883721e02b9184b3
-
SHA512
74db27871b7b67f925da145fbf74bff9cc26552650ad2043dde0b5736e92dbd4aa02982db7b5a43319b889f0ef7918569936d58bbe287f59eac9de0563c73a50
-
SSDEEP
768:fdhO/poiiUcjlJIna6H9Xqk5nWEZ5SbTDauuI7CPW5t:Vw+jjgnVH9XqcnW85SbTruIV
Malware Config
Extracted
xenorat
adminaahliya-20192.portmap.io
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/3340-1-0x0000000000070000-0x0000000000082000-memory.dmp family_xenorat behavioral1/files/0x0007000000024084-6.dat family_xenorat -
Xenorat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation slodusable.exe -
Executes dropped EXE 1 IoCs
pid Process 4200 slodusable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slodusable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slodusable.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4200 3340 slodusable.exe 88 PID 3340 wrote to memory of 4200 3340 slodusable.exe 88 PID 3340 wrote to memory of 4200 3340 slodusable.exe 88 PID 4200 wrote to memory of 2184 4200 slodusable.exe 94 PID 4200 wrote to memory of 2184 4200 slodusable.exe 94 PID 4200 wrote to memory of 2184 4200 slodusable.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\slodusable.exe"C:\Users\Admin\AppData\Local\Temp\slodusable.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Roaming\XenoManager\slodusable.exe"C:\Users\Admin\AppData\Roaming\XenoManager\slodusable.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Windows Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp91B1.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD557b18965bc465fc76e4308772ce52b36
SHA1a8ae2f505d62275f7eda77efe6ff2dd673c6f169
SHA256427e22616e32f1530951ede6671c3346f67da0b547a18267224438f45df9b2e1
SHA512a59205578e9dad30c4f4b5eafa23317ad5edcaac21a5a41e541cf7042f2b4e3e45a7db39e22f836c6cbf2996b78d0ff59010fbcbb80dbc2f7513244109c2686b
-
Filesize
46KB
MD508965376a82a70166e291a706646337b
SHA10f7d89c7048610f162c1a55285f8c9a609b309b7
SHA256c904d34c8b053a058df0e203759164233a8fe527921b3edb883721e02b9184b3
SHA51274db27871b7b67f925da145fbf74bff9cc26552650ad2043dde0b5736e92dbd4aa02982db7b5a43319b889f0ef7918569936d58bbe287f59eac9de0563c73a50