Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2024, 06:12
Behavioral task
behavioral1
Sample
ok.exe
Resource
win7-20240221-en
General
-
Target
ok.exe
-
Size
45KB
-
MD5
2d16646ae88e5979ab98de7a372337c8
-
SHA1
dd91c79b53194fa45c78df96d0bd594a35c1508e
-
SHA256
c01236d7be0ab4e31278d02559a12b8a0711144f26d37c6919375022964eba95
-
SHA512
ad61921a8f87ce17c0d4b0a481632ff310e1f150022213094a0844cd06f7942f85685aebc758e4bac368bc2c2f7422618638ab7adbc4e10caf7ed14eba3184ff
-
SSDEEP
768:NdhO/poiiUcjlJInDwH9Xqk5nWEZ5SbTDa0WI7CPW5c:Dw+jjgn0H9XqcnW85SbTlWIk
Malware Config
Extracted
xenorat
fe80::48a6:2b8e:4540:36b9%6
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
SysUpd
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation ok.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 ok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 340 wrote to memory of 1692 340 ok.exe 83 PID 340 wrote to memory of 1692 340 ok.exe 83 PID 340 wrote to memory of 1692 340 ok.exe 83 PID 1692 wrote to memory of 2024 1692 ok.exe 88 PID 1692 wrote to memory of 2024 1692 ok.exe 88 PID 1692 wrote to memory of 2024 1692 ok.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ok.exe"C:\Users\Admin\AppData\Local\Temp\ok.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Roaming\XenoManager\ok.exe"C:\Users\Admin\AppData\Roaming\XenoManager\ok.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SysUpd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4AB5.tmp" /F3⤵
- Creates scheduled task(s)
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD5c9aa6bd88516f9bc4b41dcf9dbf3bc5c
SHA13ec3443bdb01171646bfe40ba2f3c4165c5a9b8f
SHA256caaf68a6940e3fbeb4d4381a2cfa1658d604acd56bf075fd0da296db5b8f4bc3
SHA512f5b9ce7896f22b810973e36439b5a091a8a56246bdf9a02d34061b52392230d9eea3b6002fd59663edd045df1d63b35c57a78ea10edacc4732b26fdce45daf8a
-
Filesize
45KB
MD52d16646ae88e5979ab98de7a372337c8
SHA1dd91c79b53194fa45c78df96d0bd594a35c1508e
SHA256c01236d7be0ab4e31278d02559a12b8a0711144f26d37c6919375022964eba95
SHA512ad61921a8f87ce17c0d4b0a481632ff310e1f150022213094a0844cd06f7942f85685aebc758e4bac368bc2c2f7422618638ab7adbc4e10caf7ed14eba3184ff