Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 23:51

General

  • Target

    tyjhtyjty.exe

  • Size

    45KB

  • MD5

    15c2c2d9fd551bc161ff0d959f019517

  • SHA1

    af2c403a076be245ad87907650d24ae183823173

  • SHA256

    b6e5b9c22542db428703bda39bff935380a4295c7ac84839449002003d0902c7

  • SHA512

    d47f5c9a8b42a6af52ed609a1fb4edeccda1108d464f34c1c575b8e60a193a295ff5457e30789bbb3f711d73157e7d38035902cf56b7acbe27ef0452a0e52b44

  • SSDEEP

    768:MdhO/poiiUcjlJInn2gH9Xqk5nWEZ5SbTDaJuI7CPW5/:Gw+jjgnnLH9XqcnW85SbTEuIX

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

204.213.57.5

Mutex

VapePatcher

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    6666

  • startup_name

    Minecraft Launcher

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tyjhtyjty.exe
    "C:\Users\Admin\AppData\Local\Temp\tyjhtyjty.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Roaming\XenoManager\tyjhtyjty.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\tyjhtyjty.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Minecraft Launcher" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5014.tmp" /F
        3⤵
        • Creates scheduled task(s)
        PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tyjhtyjty.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\tmp5014.tmp

    Filesize

    1KB

    MD5

    7568c34a31b833b5cb65c3c566dae817

    SHA1

    498931a60debb2061ad48ba6102b9cd705c31af6

    SHA256

    edbec5fc74e5db9df876ed3a61915ea3f39b574f5c0efcf26a125d6d1d7c558c

    SHA512

    a7bc436f2be183eaa87bef9f656592fffa58ee4af90cb5559d75d0242b92d68f4f2a4cfd89ec706b3a95e9c93ec31252671cf28f14acd8150f2590e8c8860826

  • C:\Users\Admin\AppData\Roaming\XenoManager\tyjhtyjty.exe

    Filesize

    45KB

    MD5

    15c2c2d9fd551bc161ff0d959f019517

    SHA1

    af2c403a076be245ad87907650d24ae183823173

    SHA256

    b6e5b9c22542db428703bda39bff935380a4295c7ac84839449002003d0902c7

    SHA512

    d47f5c9a8b42a6af52ed609a1fb4edeccda1108d464f34c1c575b8e60a193a295ff5457e30789bbb3f711d73157e7d38035902cf56b7acbe27ef0452a0e52b44

  • memory/672-16-0x0000000074AA0000-0x0000000075250000-memory.dmp

    Filesize

    7.7MB

  • memory/672-17-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/672-20-0x0000000074AA0000-0x0000000075250000-memory.dmp

    Filesize

    7.7MB

  • memory/672-21-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/2920-0-0x0000000000D80000-0x0000000000D92000-memory.dmp

    Filesize

    72KB

  • memory/2920-1-0x0000000074AA0000-0x0000000075250000-memory.dmp

    Filesize

    7.7MB

  • memory/2920-15-0x0000000074AA0000-0x0000000075250000-memory.dmp

    Filesize

    7.7MB