Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:02
Behavioral task
behavioral1
Sample
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
Resource
win10v2004-20220812-en
General
-
Target
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe
-
Size
205KB
-
MD5
5bd790f9ad826b59173a72498f9a96e5
-
SHA1
36a1e9bbc5774f96681740e8216923e0377d05be
-
SHA256
c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe
-
SHA512
f8a7eb6143e150a4483228043e363969bdadb3d1f47e34912ebebc898bbb007db35384c9a4472c8ab556b4428f8903b2f5bd6bc3eab627954d63236af85400b8
-
SSDEEP
3072:QZkRi4rZqDjiuHg76dGMGK/P833iO779p9cFe6Q1cdE0SI1PbHNRTG64IoX:QWRTmaW9GH33hXCeBuEObHNRTG64
Malware Config
Extracted
xtremerat
juliosouza.no-ip.org
Signatures
-
Detect XtremeRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1436-133-0x0000000000C80000-0x0000000000CFA000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
resource yara_rule behavioral2/memory/1436-132-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx behavioral2/memory/1436-133-0x0000000000C80000-0x0000000000CFA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe File created C:\Windows\InstallDir\Server.exe c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 4992 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 79 PID 1436 wrote to memory of 4992 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 79 PID 1436 wrote to memory of 4968 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 80 PID 1436 wrote to memory of 4968 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 80 PID 1436 wrote to memory of 4968 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 80 PID 1436 wrote to memory of 4940 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 81 PID 1436 wrote to memory of 4940 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 81 PID 1436 wrote to memory of 5024 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 82 PID 1436 wrote to memory of 5024 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 82 PID 1436 wrote to memory of 5024 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 82 PID 1436 wrote to memory of 5032 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 83 PID 1436 wrote to memory of 5032 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 83 PID 1436 wrote to memory of 5040 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 84 PID 1436 wrote to memory of 5040 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 84 PID 1436 wrote to memory of 5040 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 84 PID 1436 wrote to memory of 4280 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 85 PID 1436 wrote to memory of 4280 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 85 PID 1436 wrote to memory of 4076 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 86 PID 1436 wrote to memory of 4076 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 86 PID 1436 wrote to memory of 4076 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 86 PID 1436 wrote to memory of 1220 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 87 PID 1436 wrote to memory of 1220 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 87 PID 1436 wrote to memory of 1980 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 88 PID 1436 wrote to memory of 1980 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 88 PID 1436 wrote to memory of 1980 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 88 PID 1436 wrote to memory of 2068 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 89 PID 1436 wrote to memory of 2068 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 89 PID 1436 wrote to memory of 4656 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 90 PID 1436 wrote to memory of 4656 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 90 PID 1436 wrote to memory of 4656 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 90 PID 1436 wrote to memory of 2116 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 91 PID 1436 wrote to memory of 2116 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 91 PID 1436 wrote to memory of 4612 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 92 PID 1436 wrote to memory of 4612 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 92 PID 1436 wrote to memory of 4612 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 92 PID 1436 wrote to memory of 4620 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 93 PID 1436 wrote to memory of 4620 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 93 PID 1436 wrote to memory of 4136 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 94 PID 1436 wrote to memory of 4136 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 94 PID 1436 wrote to memory of 4136 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 94 PID 1436 wrote to memory of 396 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 95 PID 1436 wrote to memory of 396 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 95 PID 1436 wrote to memory of 4312 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 96 PID 1436 wrote to memory of 4312 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 96 PID 1436 wrote to memory of 4312 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 96 PID 1436 wrote to memory of 4308 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 97 PID 1436 wrote to memory of 4308 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 97 PID 1436 wrote to memory of 2984 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 98 PID 1436 wrote to memory of 2984 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 98 PID 1436 wrote to memory of 2984 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 98 PID 1436 wrote to memory of 2140 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 99 PID 1436 wrote to memory of 2140 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 99 PID 1436 wrote to memory of 2800 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 100 PID 1436 wrote to memory of 2800 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 100 PID 1436 wrote to memory of 2800 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 100 PID 1436 wrote to memory of 1872 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 101 PID 1436 wrote to memory of 1872 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 101 PID 1436 wrote to memory of 740 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 102 PID 1436 wrote to memory of 740 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 102 PID 1436 wrote to memory of 740 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 102 PID 1436 wrote to memory of 3392 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 103 PID 1436 wrote to memory of 3392 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 103 PID 1436 wrote to memory of 540 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 104 PID 1436 wrote to memory of 540 1436 c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe"C:\Users\Admin\AppData\Local\Temp\c81547b192e71dc1c4859368795cb687be1cc5a9e2f2c5137ee290cfb8d504fe.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4992
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4940
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:5032
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4280
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1220
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2068
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2116
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4620
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:396
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:4308
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2140
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1872
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3392
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1644
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2472
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵PID:2496
-