Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 09:06
Behavioral task
behavioral1
Sample
temp.exe
Resource
win7-20240215-en
General
-
Target
temp.exe
-
Size
45KB
-
MD5
5ed8fdb7ba27b358c6ec3b2e84b8bed9
-
SHA1
be26d54fa19609db11f199926834dcdd6c5e99d1
-
SHA256
fcfda6a10b0d3f6d93736e452ce1b2673e7cd31521b16006d1bdf5c7749e63f5
-
SHA512
6a3f55e88058cca1a86707460c19b9ab44966c6703568a35844b047f6dcfe9d31ea9f378219b88500c4a2167df7d4b38a79eeeffcb0801722b4c81f227b224af
-
SSDEEP
768:NdhO/poiiUcjlJIn7wH9Xqk5nWEZ5SbTDaBWI7CPW5p:Dw+jjgncH9XqcnW85SbToWIh
Malware Config
Extracted
xenorat
mohabfsda-20049.portmap.host
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
20049
-
startup_name
update
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation temp.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation temp.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe 4756 temp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4756 temp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4756 2360 temp.exe 89 PID 2360 wrote to memory of 4756 2360 temp.exe 89 PID 2360 wrote to memory of 4756 2360 temp.exe 89 PID 4756 wrote to memory of 4572 4756 temp.exe 94 PID 4756 wrote to memory of 4572 4756 temp.exe 94 PID 4756 wrote to memory of 4572 4756 temp.exe 94 PID 4756 wrote to memory of 1504 4756 temp.exe 101 PID 4756 wrote to memory of 1504 4756 temp.exe 101 PID 4756 wrote to memory of 1504 4756 temp.exe 101 PID 4756 wrote to memory of 3692 4756 temp.exe 103 PID 4756 wrote to memory of 3692 4756 temp.exe 103 PID 4756 wrote to memory of 3692 4756 temp.exe 103 PID 4756 wrote to memory of 4956 4756 temp.exe 105 PID 4756 wrote to memory of 4956 4756 temp.exe 105 PID 4756 wrote to memory of 4956 4756 temp.exe 105 PID 4956 wrote to memory of 4548 4956 cmd.exe 107 PID 4956 wrote to memory of 4548 4956 cmd.exe 107 PID 4956 wrote to memory of 4548 4956 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\XenoManager\temp.exe"C:\Users\Admin\AppData\Roaming\XenoManager\temp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "update" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4A28.tmp" /F3⤵
- Creates scheduled task(s)
PID:4572
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv3⤵PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /delete /tn "\update" /f3⤵PID:3692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\XenoManager\temp.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:4548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD56b95e49f2c6439116179ec78425c3b30
SHA1829bfe3caf83e72c509f7df8aba0ddcaffe5e7eb
SHA256b5c98f5a59bca7e1fe8fe037a5a7ae551576c034800b6a644593c8a1e29c33ca
SHA51264058397704f5a1cbbd7fc4cc356e4cb5dae415deb1c1937cf796aa431f90243084a4928a55e3da7f3704c3eb2d0d3321cca34d97f48f0cc033223f57e855673
-
Filesize
45KB
MD55ed8fdb7ba27b358c6ec3b2e84b8bed9
SHA1be26d54fa19609db11f199926834dcdd6c5e99d1
SHA256fcfda6a10b0d3f6d93736e452ce1b2673e7cd31521b16006d1bdf5c7749e63f5
SHA5126a3f55e88058cca1a86707460c19b9ab44966c6703568a35844b047f6dcfe9d31ea9f378219b88500c4a2167df7d4b38a79eeeffcb0801722b4c81f227b224af