Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2022, 00:55

General

  • Target

    1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2.exe

  • Size

    231KB

  • MD5

    a21e5d4f4ecc934d8b3916cc86a8e0e1

  • SHA1

    da9de18bb4c68469ccd9add1450e52dbe024d063

  • SHA256

    1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2

  • SHA512

    be3182a28bf7c0b0c91abe419a1b4b230728cfc7d849b679ecf8ac2f3fd143a413ad024a4513dc5d778d8365a697a1db3a291bb92ffc06d0c7fb96ec4383391d

  • SSDEEP

    6144:Wg572n+aCyIK3ccnMxjyHJ97Z5R+4MBhJCs:j5yW1K3Dns6xN+Rr8s

Malware Config

Extracted

Family

xtremerat

C2

gaiaonline.no-ip.biz

Signatures

  • Detect XtremeRAT payload 3 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2.exe
    "C:\Users\Admin\AppData\Local\Temp\1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Local\Temp\1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2.exe
      "C:\Users\Admin\AppData\Local\Temp\1a8cac16782fb83f958f805bcffb5ca8c34049a1a98e0d54d26dc411eaefd6a2.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        3⤵
          PID:2064
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
          3⤵
            PID:3932
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
            3⤵
              PID:2952
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
              3⤵
                PID:1404
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                3⤵
                  PID:1332
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                  3⤵
                    PID:4504
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                    3⤵
                      PID:4988
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                      3⤵
                        PID:4400

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/4396-138-0x0000000002CC0000-0x0000000002CC8000-memory.dmp

                    Filesize

                    32KB

                  • memory/4720-135-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4720-137-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4720-139-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4720-140-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4720-141-0x0000000013140000-0x000000001315F000-memory.dmp

                    Filesize

                    124KB