Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 09:02
Behavioral task
behavioral1
Sample
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
Resource
win10v2004-20220812-en
General
-
Target
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
-
Size
205KB
-
MD5
5bd790f9ad826b59173a72498f9a96e5
-
SHA1
36a1e9bbc5774f96681740e8216923e0377d05be
-
SHA256
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe
-
SHA512
f8a7eb6143e150a4483228043e363969bdadb3d1f47e34912ebebc898bbb007db35384c9a4472c8ab556b4428f8903b2f5bd6bc3eab627954d63236af85400b8
-
SSDEEP
3072:QZkRi4rZqDjiuHg76dGMGK/P833iO779p9cFe6Q1cdE0SI1PbHNRTG64IoX:QWRTmaW9GH33hXCeBuEObHNRTG64
Malware Config
Extracted
xtremerat
juliosouza.no-ip.org
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral1/memory/1108-55-0x0000000000C80000-0x0000000000CFA000-memory.dmp family_xtremerat behavioral1/memory/980-58-0x0000000000000000-mapping.dmp family_xtremerat behavioral1/memory/980-61-0x0000000000C80000-0x0000000000CFA000-memory.dmp family_xtremerat behavioral1/memory/1108-62-0x0000000000C80000-0x0000000000CFA000-memory.dmp family_xtremerat behavioral1/memory/980-63-0x0000000000C80000-0x0000000000CFA000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
resource yara_rule behavioral1/memory/1108-55-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx behavioral1/memory/980-61-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx behavioral1/memory/1108-62-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx behavioral1/memory/980-63-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe File created C:\Windows\InstallDir\Server.exe c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 980 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1108 wrote to memory of 904 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 27 PID 1108 wrote to memory of 904 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 27 PID 1108 wrote to memory of 904 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 27 PID 1108 wrote to memory of 904 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 27 PID 1108 wrote to memory of 980 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 28 PID 1108 wrote to memory of 980 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 28 PID 1108 wrote to memory of 980 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 28 PID 1108 wrote to memory of 980 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 28 PID 1108 wrote to memory of 980 1108 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe"C:\Users\Admin\AppData\Local\Temp\c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:904
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:980
-