Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2024, 07:45
Behavioral task
behavioral1
Sample
AuthClient.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
AuthClient.exe
Resource
win10v2004-20240226-en
General
-
Target
AuthClient.exe
-
Size
45KB
-
MD5
de382ff81756934ba776279c448a37b1
-
SHA1
de6741ec906099d79b5c430c210725d534b13440
-
SHA256
6185e375599f40eb19cc5464cd33b388e2b42a0dbf065a67bb395757291d5080
-
SHA512
8be70b011694df2b9031c9483170d8191647a86a843f82d083d0ddd67da4baa25137da3334d1582d5bada4f8e6f3b2d3a13db755d293f2d52aca7aff1aaad73c
-
SSDEEP
768:MdhO/poiiUcjlJInSmH9Xqk5nWEZ5SbTDaIuI7CPW5f:Gw+jjgn5H9XqcnW85SbT1uIn
Malware Config
Extracted
xenorat
Vallithebest-32755.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
32755
-
startup_name
AuthClientV2
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4156 AuthClient.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 60 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe 4156 AuthClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4156 AuthClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4156 AuthClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4156 2252 AuthClient.exe 73 PID 2252 wrote to memory of 4156 2252 AuthClient.exe 73 PID 2252 wrote to memory of 4156 2252 AuthClient.exe 73 PID 4156 wrote to memory of 60 4156 AuthClient.exe 74 PID 4156 wrote to memory of 60 4156 AuthClient.exe 74 PID 4156 wrote to memory of 60 4156 AuthClient.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"C:\Users\Admin\AppData\Local\Temp\AuthClient.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\XenoManager\AuthClient.exe"C:\Users\Admin\AppData\Roaming\XenoManager\AuthClient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "AuthClientV2" /XML "C:\Users\Admin\AppData\Local\Temp\tmp90E6.tmp" /F3⤵
- Creates scheduled task(s)
PID:60
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
1KB
MD54dd04cfa7ab46782f28022890c1434c0
SHA1c14317c1b75b82a85f3a9782048f8a28e6577ff1
SHA2560ef989b1db3295837b8aa83585eed3193823e1a385ee3fb8c4d762ed22f8b94e
SHA512a574b11af438005021c25ba721d09fca8a081e28c5641b021af85c2a9177fd685884c08e1e29c18b23913dcd7ab200717462f1f5291645448ab5184d5d33db79
-
Filesize
45KB
MD5de382ff81756934ba776279c448a37b1
SHA1de6741ec906099d79b5c430c210725d534b13440
SHA2566185e375599f40eb19cc5464cd33b388e2b42a0dbf065a67bb395757291d5080
SHA5128be70b011694df2b9031c9483170d8191647a86a843f82d083d0ddd67da4baa25137da3334d1582d5bada4f8e6f3b2d3a13db755d293f2d52aca7aff1aaad73c