Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 23:51
General
-
Target
tyjhtyjty.exe
-
Size
45KB
-
MD5
15c2c2d9fd551bc161ff0d959f019517
-
SHA1
af2c403a076be245ad87907650d24ae183823173
-
SHA256
b6e5b9c22542db428703bda39bff935380a4295c7ac84839449002003d0902c7
-
SHA512
d47f5c9a8b42a6af52ed609a1fb4edeccda1108d464f34c1c575b8e60a193a295ff5457e30789bbb3f711d73157e7d38035902cf56b7acbe27ef0452a0e52b44
-
SSDEEP
768:MdhO/poiiUcjlJInn2gH9Xqk5nWEZ5SbTDaJuI7CPW5/:Gw+jjgnnLH9XqcnW85SbTEuIX
Malware Config
Extracted
xenorat
204.213.57.5
VapePatcher
-
delay
5000
-
install_path
appdata
-
port
6666
-
startup_name
Minecraft Launcher
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation tyjhtyjty.exe -
Executes dropped EXE 1 IoCs
pid Process 672 tyjhtyjty.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4668 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2920 wrote to memory of 672 2920 tyjhtyjty.exe 84 PID 2920 wrote to memory of 672 2920 tyjhtyjty.exe 84 PID 2920 wrote to memory of 672 2920 tyjhtyjty.exe 84 PID 672 wrote to memory of 4668 672 tyjhtyjty.exe 89 PID 672 wrote to memory of 4668 672 tyjhtyjty.exe 89 PID 672 wrote to memory of 4668 672 tyjhtyjty.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\tyjhtyjty.exe"C:\Users\Admin\AppData\Local\Temp\tyjhtyjty.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\XenoManager\tyjhtyjty.exe"C:\Users\Admin\AppData\Roaming\XenoManager\tyjhtyjty.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Minecraft Launcher" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5014.tmp" /F3⤵
- Creates scheduled task(s)
PID:4668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1KB
MD57568c34a31b833b5cb65c3c566dae817
SHA1498931a60debb2061ad48ba6102b9cd705c31af6
SHA256edbec5fc74e5db9df876ed3a61915ea3f39b574f5c0efcf26a125d6d1d7c558c
SHA512a7bc436f2be183eaa87bef9f656592fffa58ee4af90cb5559d75d0242b92d68f4f2a4cfd89ec706b3a95e9c93ec31252671cf28f14acd8150f2590e8c8860826
-
Filesize
45KB
MD515c2c2d9fd551bc161ff0d959f019517
SHA1af2c403a076be245ad87907650d24ae183823173
SHA256b6e5b9c22542db428703bda39bff935380a4295c7ac84839449002003d0902c7
SHA512d47f5c9a8b42a6af52ed609a1fb4edeccda1108d464f34c1c575b8e60a193a295ff5457e30789bbb3f711d73157e7d38035902cf56b7acbe27ef0452a0e52b44