Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:04
Behavioral task
behavioral1
Sample
d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe
Resource
win10v2004-20220901-en
General
-
Target
d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe
-
Size
45KB
-
MD5
83121fb09c3da34c442aca4478460210
-
SHA1
e90b458db9298219f24097e9af29d5a6017dcd29
-
SHA256
d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b
-
SHA512
af32c11467cc84bdffe912dda99481efd5fde1191afec8431be6187f4b53b1d96d302ae54c27c9b3eb5f8c2dc6ffd07807b5aa16afa42744b57380dcf8d9e765
-
SSDEEP
768:9Br+tjFY90iY6W1jwmDzKgEFQXaklMIAnH8hwfOgw0cVzowKU:jyRh31jxPEFQXak+H84bUowh
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe File created C:\Windows\InstallDir\Server.exe d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1508 wrote to memory of 592 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 26 PID 1508 wrote to memory of 592 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 26 PID 1508 wrote to memory of 592 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 26 PID 1508 wrote to memory of 592 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 26 PID 1508 wrote to memory of 1900 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 27 PID 1508 wrote to memory of 1900 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 27 PID 1508 wrote to memory of 1900 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 27 PID 1508 wrote to memory of 1900 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 27 PID 1508 wrote to memory of 1760 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 28 PID 1508 wrote to memory of 1760 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 28 PID 1508 wrote to memory of 1760 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 28 PID 1508 wrote to memory of 1760 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 28 PID 1508 wrote to memory of 1680 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 29 PID 1508 wrote to memory of 1680 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 29 PID 1508 wrote to memory of 1680 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 29 PID 1508 wrote to memory of 1680 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 29 PID 1508 wrote to memory of 1772 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 30 PID 1508 wrote to memory of 1772 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 30 PID 1508 wrote to memory of 1772 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 30 PID 1508 wrote to memory of 1772 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 30 PID 1508 wrote to memory of 944 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 31 PID 1508 wrote to memory of 944 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 31 PID 1508 wrote to memory of 944 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 31 PID 1508 wrote to memory of 944 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 31 PID 1508 wrote to memory of 948 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 32 PID 1508 wrote to memory of 948 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 32 PID 1508 wrote to memory of 948 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 32 PID 1508 wrote to memory of 948 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 32 PID 1508 wrote to memory of 1888 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 33 PID 1508 wrote to memory of 1888 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 33 PID 1508 wrote to memory of 1888 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 33 PID 1508 wrote to memory of 1888 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 33 PID 1508 wrote to memory of 952 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 34 PID 1508 wrote to memory of 952 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 34 PID 1508 wrote to memory of 952 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 34 PID 1508 wrote to memory of 952 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 34 PID 1508 wrote to memory of 1676 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 35 PID 1508 wrote to memory of 1676 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 35 PID 1508 wrote to memory of 1676 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 35 PID 1508 wrote to memory of 1676 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 35 PID 1508 wrote to memory of 972 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 36 PID 1508 wrote to memory of 972 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 36 PID 1508 wrote to memory of 972 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 36 PID 1508 wrote to memory of 972 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 36 PID 1508 wrote to memory of 1748 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 37 PID 1508 wrote to memory of 1748 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 37 PID 1508 wrote to memory of 1748 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 37 PID 1508 wrote to memory of 1748 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 37 PID 1508 wrote to memory of 928 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 38 PID 1508 wrote to memory of 928 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 38 PID 1508 wrote to memory of 928 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 38 PID 1508 wrote to memory of 928 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 38 PID 1508 wrote to memory of 840 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 39 PID 1508 wrote to memory of 840 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 39 PID 1508 wrote to memory of 840 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 39 PID 1508 wrote to memory of 840 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 39 PID 1508 wrote to memory of 892 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 40 PID 1508 wrote to memory of 892 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 40 PID 1508 wrote to memory of 892 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 40 PID 1508 wrote to memory of 892 1508 d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe"C:\Users\Admin\AppData\Local\Temp\d84051600b4210a62534a91831c2de85668ae6484b769e70ce8233686a9d138b.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:592
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1900
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1760
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1680
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1772
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:944
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:948
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1888
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:952
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1676
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:972
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:1748
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:928
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:840
-
-
C:\Windows\SysWOW64\calc.execalc.exe2⤵PID:892
-