Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
Valorant Checker by Xinax.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Valorant Checker by Xinax.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
password.txt
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
password.txt
Resource
win10v2004-20230221-en
General
-
Target
Valorant Checker by Xinax.exe
-
Size
2.0MB
-
MD5
91061e34a8dbc6156e3fa75dc322e4b0
-
SHA1
628a4c88f0a3823e07ae055df36bae6b36049419
-
SHA256
68e98c4079707047d46a02729663551e5eafb34e76bccd018d0beee25dc70ed0
-
SHA512
6029bed5c4486d0ff4bc348eb924cc9901d57d6781af818b5add937a55fc5cc9acfdc1a7dd01021de13d0e685d3f71bc865730fcd2f47e92797de29413aaaf22
-
SSDEEP
49152:IBJgkNXymHeCn46zWhYhJseQLTKNWAGM9SwE:yWkxddnK+OiUAGMw
Malware Config
Signatures
-
.NET Reactor proctector 8 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000a0000000135ce-59.dat net_reactor behavioral1/files/0x000a0000000135ce-61.dat net_reactor behavioral1/files/0x000a0000000135ce-68.dat net_reactor behavioral1/files/0x000a0000000135ce-66.dat net_reactor behavioral1/files/0x000a0000000135ce-63.dat net_reactor behavioral1/files/0x000a0000000135ce-70.dat net_reactor behavioral1/files/0x000a0000000135ce-71.dat net_reactor behavioral1/memory/484-72-0x0000000000E20000-0x0000000000FF6000-memory.dmp net_reactor -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost64.exe Valorant_Checker by Xinax.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost64.exe Valorant_Checker by Xinax.exe -
Executes dropped EXE 2 IoCs
pid Process 484 Valorant Checker by Xinax.exe 1840 Valorant_Checker by Xinax.exe -
Loads dropped DLL 8 IoCs
pid Process 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe 1488 Valorant Checker by Xinax.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 568 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 888 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 484 Valorant Checker by Xinax.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 484 Valorant Checker by Xinax.exe Token: SeDebugPrivilege 888 taskkill.exe Token: SeDebugPrivilege 1840 Valorant_Checker by Xinax.exe Token: 33 268 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 268 AUDIODG.EXE Token: 33 268 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 268 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1488 wrote to memory of 484 1488 Valorant Checker by Xinax.exe 27 PID 1488 wrote to memory of 484 1488 Valorant Checker by Xinax.exe 27 PID 1488 wrote to memory of 484 1488 Valorant Checker by Xinax.exe 27 PID 1488 wrote to memory of 484 1488 Valorant Checker by Xinax.exe 27 PID 484 wrote to memory of 1092 484 Valorant Checker by Xinax.exe 29 PID 484 wrote to memory of 1092 484 Valorant Checker by Xinax.exe 29 PID 484 wrote to memory of 1092 484 Valorant Checker by Xinax.exe 29 PID 484 wrote to memory of 1092 484 Valorant Checker by Xinax.exe 29 PID 1092 wrote to memory of 2012 1092 cmd.exe 31 PID 1092 wrote to memory of 2012 1092 cmd.exe 31 PID 1092 wrote to memory of 2012 1092 cmd.exe 31 PID 1092 wrote to memory of 2012 1092 cmd.exe 31 PID 1092 wrote to memory of 888 1092 cmd.exe 32 PID 1092 wrote to memory of 888 1092 cmd.exe 32 PID 1092 wrote to memory of 888 1092 cmd.exe 32 PID 1092 wrote to memory of 888 1092 cmd.exe 32 PID 1092 wrote to memory of 568 1092 cmd.exe 33 PID 1092 wrote to memory of 568 1092 cmd.exe 33 PID 1092 wrote to memory of 568 1092 cmd.exe 33 PID 1092 wrote to memory of 568 1092 cmd.exe 33 PID 1488 wrote to memory of 1840 1488 Valorant Checker by Xinax.exe 34 PID 1488 wrote to memory of 1840 1488 Valorant Checker by Xinax.exe 34 PID 1488 wrote to memory of 1840 1488 Valorant Checker by Xinax.exe 34 PID 1488 wrote to memory of 1840 1488 Valorant Checker by Xinax.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Valorant Checker by Xinax.exe"C:\Users\Admin\AppData\Local\Temp\Valorant Checker by Xinax.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Valorant Checker by Xinax.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Valorant Checker by Xinax.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB50E.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 4844⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- Delays execution with timeout.exe
PID:568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Valorant_Checker by Xinax.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Valorant_Checker by Xinax.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1456
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
56B
MD5a97137e5681a993aca5d5da385941f9c
SHA19ba8d69d97888fa6137f48c6d1f60752bedba86b
SHA256d1b1e7535a9bedad8ee5cc43099fe87cbe7990a84987de49f3a76d97c6925ae6
SHA5122bae639aba1e726076b33b059aec3898ba2d8425c2aa793b2257deaa8beeff446bb6a4b849f9ea22bcb59308bf9b240b2b4927a99489b64ea13de256b4a64081
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
1.8MB
MD513c6d746798d94c90d5a96cf72f61a6b
SHA118624a712489d513855bb7f5c482af2ce5165aa5
SHA25663d9faf84349fd5984937713409c3afc6c3150b6a0d18909031e1022b45fa28a
SHA512034d653db4ef1167c29170795bc7482f667c9b8b0cb8f63e211631239c666acf650d20976bfe4ffbb550b8fbf7c704f3fd8e23bb5a666122fe88398f1fb1b071
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0
-
Filesize
135KB
MD5b03d6a21639e1221fba85ffe3d6355e7
SHA13f1e46f1b833d5598ceeaad293feec837fc4da57
SHA256e809f5a609f862e6352337569249959867dea6a55ab3552f32d385e9c921ae0b
SHA512e8715b273a90dd53557212685519297cb211a72400b52ff0d33141f0f6aeeb9e7c2bd4067069d132e532cfdee138d1444cd323fb6fdb8f6fdbdcefe366ad99f0