Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/07/2022, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
Resource
win10v2004-20220414-en
General
-
Target
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe
-
Size
886KB
-
MD5
40eaca541433514a31508b7a328db6ef
-
SHA1
bca267e3a5007147c9c0cb44612bf6027b47ba76
-
SHA256
4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2
-
SHA512
3fa774f21f13b349e3474ba6da9d0835151d31847f2051f731d24a71e8e6b66be0d35d495b4db9bed7f1697c55533c141b2b70f8d94d53d3e7b50e6cc9ffbf24
Malware Config
Extracted
xtremerat
feelmepkudie.no-ip.org
Signatures
-
Detect XtremeRAT payload 15 IoCs
resource yara_rule behavioral2/memory/4740-132-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4740-133-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4740-134-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4740-135-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4724-136-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4740-138-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4724-139-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4388-140-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/1800-141-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4640-142-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4388-143-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1800-144-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4640-146-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4740-145-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/4388-147-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID} 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe restart" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2JE2C8F4-2VT5-K1NJ-HRTM-4K0C061TM2ID}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe restart" svchost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Facebook = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinUpdate\\Update.exe" 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\U: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\W: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\E: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\I: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\M: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\R: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\F: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Q: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\V: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\P: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\T: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\X: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Y: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\A: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\B: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\K: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\N: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\Z: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\O: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\G: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\H: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\J: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe File opened (read-only) \??\L: 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4468 set thread context of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe Token: SeCreatePagefilePrivilege 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4468 wrote to memory of 4740 4468 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe 81 PID 4740 wrote to memory of 4724 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 82 PID 4740 wrote to memory of 4724 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 82 PID 4740 wrote to memory of 4724 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 82 PID 4740 wrote to memory of 4724 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 82 PID 4740 wrote to memory of 848 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 83 PID 4740 wrote to memory of 848 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 83 PID 4740 wrote to memory of 4728 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 4740 wrote to memory of 4728 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 4740 wrote to memory of 4728 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 84 PID 4740 wrote to memory of 1892 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 85 PID 4740 wrote to memory of 1892 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 85 PID 4740 wrote to memory of 4612 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 4740 wrote to memory of 4612 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 4740 wrote to memory of 4612 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 86 PID 4740 wrote to memory of 4368 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 87 PID 4740 wrote to memory of 4368 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 87 PID 4740 wrote to memory of 4388 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 4740 wrote to memory of 4388 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 4740 wrote to memory of 4388 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 4740 wrote to memory of 4388 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 88 PID 4740 wrote to memory of 1216 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 89 PID 4740 wrote to memory of 1216 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 89 PID 4740 wrote to memory of 1800 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 90 PID 4740 wrote to memory of 1800 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 90 PID 4740 wrote to memory of 1800 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 90 PID 4740 wrote to memory of 1800 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 90 PID 4740 wrote to memory of 1264 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 91 PID 4740 wrote to memory of 1264 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 91 PID 4740 wrote to memory of 4640 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 4740 wrote to memory of 4640 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 4740 wrote to memory of 4640 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92 PID 4740 wrote to memory of 4640 4740 4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe"C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE"C:\Users\Admin\AppData\Local\Temp\4adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2.ExE"2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:848
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1892
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4368
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1216
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1264
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
886KB
MD540eaca541433514a31508b7a328db6ef
SHA1bca267e3a5007147c9c0cb44612bf6027b47ba76
SHA2564adbe2d65372183b94331aa85fbc68fd11c1031a36f316c8fe07e226f04651d2
SHA5123fa774f21f13b349e3474ba6da9d0835151d31847f2051f731d24a71e8e6b66be0d35d495b4db9bed7f1697c55533c141b2b70f8d94d53d3e7b50e6cc9ffbf24