Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1800s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2024, 13:46

General

  • Target

    RegistryHelper.exe

  • Size

    46KB

  • MD5

    d7916e968a167b3054cb3078debb1fc4

  • SHA1

    35b69b95699451453715b8f6963b18c5909ee665

  • SHA256

    8fc30212418d834f5072dea6843fac92a080d10c33fc2a108bdc0d1183dc3c90

  • SHA512

    3a9bb21e887cc2a0d5d7ebd04698287100d66173cbe199537a2bc47a6f632da6e5f1db9f95597bb68836614d435da100f7196edc435eb2d97a04187d8bbc4487

  • SSDEEP

    768:fdhO/poiiUcjlJIn3sPH9Xqk5nWEZ5SbTDanuI7CPW5S:Vw+jjgn8PH9XqcnW85SbT6uIa

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

3.66.38.117

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    11671

  • startup_name

    Microsoft Windows Core Process

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RegistryHelper.exe
    "C:\Users\Admin\AppData\Local\Temp\RegistryHelper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Users\Admin\AppData\Roaming\XenoManager\RegistryHelper.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\RegistryHelper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Microsoft Windows Core Process" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6215.tmp" /F
        3⤵
        • Creates scheduled task(s)
        PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegistryHelper.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\tmp6215.tmp

    Filesize

    1KB

    MD5

    e3514ad7e570cfe068b7d975b605024a

    SHA1

    7ca2cd816e5c5a41307e93b7b5b4b6c38573a71e

    SHA256

    811daca0de2ee20be21c89bfca253565d81e5fc8234eaef6fee4e161674eef96

    SHA512

    0e49bd0939affae0a2a08998271deeedabe652e898421775feb59d911a8bf259ff498e5543085ec87574de46e74132a65a4d04889cae8f36fe4fd0660d2e7e99

  • C:\Users\Admin\AppData\Roaming\XenoManager\RegistryHelper.exe

    Filesize

    46KB

    MD5

    d7916e968a167b3054cb3078debb1fc4

    SHA1

    35b69b95699451453715b8f6963b18c5909ee665

    SHA256

    8fc30212418d834f5072dea6843fac92a080d10c33fc2a108bdc0d1183dc3c90

    SHA512

    3a9bb21e887cc2a0d5d7ebd04698287100d66173cbe199537a2bc47a6f632da6e5f1db9f95597bb68836614d435da100f7196edc435eb2d97a04187d8bbc4487

  • memory/3212-0-0x00000000004B0000-0x00000000004C2000-memory.dmp

    Filesize

    72KB

  • memory/3212-1-0x00000000748E0000-0x0000000075090000-memory.dmp

    Filesize

    7.7MB

  • memory/3212-16-0x00000000748E0000-0x0000000075090000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-15-0x00000000748E0000-0x0000000075090000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-17-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB

  • memory/5020-20-0x0000000005460000-0x00000000054C6000-memory.dmp

    Filesize

    408KB

  • memory/5020-21-0x00000000748E0000-0x0000000075090000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-22-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB