Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe
Resource
win10v2004-20220812-en
General
-
Target
e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe
-
Size
54KB
-
MD5
04c4553c0a90ce1678e23e9caeb1e638
-
SHA1
f5e8af3974ecff65dbd7438c492c26073dbdc33f
-
SHA256
e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587
-
SHA512
d1f188b4b1f2e255e2f6de3ca4a76ade1dd32f9126a284acadb65cebec875f98f3755124124b8ea17c50e4137445b04144e51762d408877d6eee48d23d9f5b02
-
SSDEEP
768:qiIofHSeDVtA/Wy8XIvguzGZkmNi8KicZu4CHzGmSVbRnb1UGme4oUL3zePZo5YC:qSrCJRvghVNDuZ0Gm4V1UGm3oozeR9o
Malware Config
Extracted
xtremerat
撰hack4ps.no-ip.info
6JhgEskcretMKY0gNfPERSISTxkiller.no-ip.info
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/3428-136-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3428-137-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3428-138-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4J2HF5HQ-7067-T665-0KA3-I527GLTEG0RC} e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4J2HF5HQ-7067-T665-0KA3-I527GLTEG0RC}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe -
resource yara_rule behavioral2/memory/3428-133-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3428-135-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3428-136-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3428-137-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/3428-138-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4628 set thread context of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe File created C:\Windows\InstallDir\Server.exe e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81 PID 4628 wrote to memory of 3428 4628 e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe"C:\Users\Admin\AppData\Local\Temp\e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exeC:\Users\Admin\AppData\Local\Temp\e327a743f81a3ae07c17f1d5a57828ad4710538b7720415d0ffb26ec3c4d3587.exe2⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3428
-