Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
982ec0a7e4cc9470cb6885b8d816fa45.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
982ec0a7e4cc9470cb6885b8d816fa45.exe
Resource
win10v2004-20231215-en
General
-
Target
982ec0a7e4cc9470cb6885b8d816fa45.exe
-
Size
956KB
-
MD5
982ec0a7e4cc9470cb6885b8d816fa45
-
SHA1
9c550995ab7251f60ad625e5d0251374e7ca73f6
-
SHA256
e0849ba088740afd3f09558cc1d9001b019f3bc4901563f5bc7bfedea2d38860
-
SHA512
9c5c7ae76d406057d75b7c64f776fdc5b519bbc4b0fa29c4263e41df097ef0a05e9b934ddd95fb65ba6d1e4bfb0672c395fb22ae4f0524169a0900f03b9be7fd
-
SSDEEP
12288:A/gctSVTWOWOdT/zvTjv95cTGMaqRL2nOxr/JZLYi8gPRyw7V57R8b8oOmn:A/FtATE67LjeJR7nV1k8Z0
Malware Config
Extracted
xtremerat
goshare.dyndns.biz
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral2/memory/4756-29-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/732-30-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4756-31-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 982ec0a7e4cc9470cb6885b8d816fa45.exe -
Executes dropped EXE 1 IoCs
pid Process 732 server.exe -
resource yara_rule behavioral2/files/0x000600000002312f-18.dat upx behavioral2/memory/732-26-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4756-29-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/732-30-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4756-31-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 460 4756 WerFault.exe 86 2452 4756 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4592 wrote to memory of 732 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 85 PID 4592 wrote to memory of 732 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 85 PID 4592 wrote to memory of 732 4592 982ec0a7e4cc9470cb6885b8d816fa45.exe 85 PID 732 wrote to memory of 4756 732 server.exe 86 PID 732 wrote to memory of 4756 732 server.exe 86 PID 732 wrote to memory of 4756 732 server.exe 86 PID 732 wrote to memory of 4756 732 server.exe 86 PID 732 wrote to memory of 1892 732 server.exe 87 PID 732 wrote to memory of 1892 732 server.exe 87 PID 732 wrote to memory of 1892 732 server.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\982ec0a7e4cc9470cb6885b8d816fa45.exe"C:\Users\Admin\AppData\Local\Temp\982ec0a7e4cc9470cb6885b8d816fa45.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 4804⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 5044⤵
- Program crash
PID:2452
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4756 -ip 47561⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4756 -ip 47561⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5687476c1c257083237b9c35c78c991f2
SHA1792778a5488896d20f6598730dd62b66b2807699
SHA25663f92f378777374ec67301a0e519694083ad9961ef64d07d69653c4f2444e52e
SHA51273d829223bba35bf4d0bf22ce01b83b1fb5e782dfdaf5746c3e78af5d424f15448d1a2e9cd9a79f8e792bd18b2da657b326f88cb1644d8a2adbbd393f1f17bf9
-
Filesize
1KB
MD55086e32e2215de761a965efa17a74aa9
SHA1470bc208058f04397f3990ced6e235adc7dd73ab
SHA256a0c6fe2557751b2073688fb956cf2ec0bfce7e7b5b372b2a573c39b3979df278
SHA512f697ff0551600b5026a9af9be22fa201c85ce782418eca639ba931cbfc31e5b8c799139289abc1d419b062412d7643e64985abffcbf9dcc49828cdaa613a3aa6