Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
xeno.bin
Resource
win7-20240508-en
General
-
Target
xeno.bin
-
Size
37KB
-
MD5
9a822598e6ce84d9f91568e4b2a590f5
-
SHA1
d8fc5be1d00112c1f2c27c6ae83a17a1535c148a
-
SHA256
74f9f2adf655a959c5bf7cef689618672a28546bf6df32cc6e472b047c75c1a1
-
SHA512
ee820515757a793bb5ca5da6697fa5d6c7e0ff177e5b1f6fe6c1bc629b9eac24fb9e6d7ca7d3337637054a7f00a112038ce3a3e96c49c4df3ef6ed9d5005135f
-
SSDEEP
768:FEJWJf4tViQOW2GRXslVS8gcuTdSPOaC9Mw1BfiTVNTPrFdy4Y:F8ZtViQz2GRXf8gcMwOa8BfAhPrFd1Y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2672 2748 cmd.exe 29 PID 2748 wrote to memory of 2672 2748 cmd.exe 29 PID 2748 wrote to memory of 2672 2748 cmd.exe 29 PID 2672 wrote to memory of 2868 2672 rundll32.exe 30 PID 2672 wrote to memory of 2868 2672 rundll32.exe 30 PID 2672 wrote to memory of 2868 2672 rundll32.exe 30 PID 2672 wrote to memory of 2868 2672 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xeno.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xeno.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\xeno.bin"3⤵
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54f20810ceb3a34b8f3b1b1c70a4f9fd3
SHA1771655bc626a8ab933d01f91919f514961f4c67e
SHA256f83394b13ab41ae4f534c2ab6441110240b845427982c3e995f34094a7d6ede6
SHA512a43129ebf7093ed2184d1fd324545c8a4e67f261365d007294676b5c66088fa069cf69ebb16c99a45325f2dc3befa9d13fb18f4ba2e1001ec73994516cc222af