Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
50s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/07/2024, 22:54
Behavioral task
behavioral1
Sample
TransAgenda.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
TransAgenda.exe
Resource
win10v2004-20240709-en
General
-
Target
TransAgenda.exe
-
Size
127KB
-
MD5
8dbebef8a47ea96ceed4408641e195ce
-
SHA1
b13a236bdf60de5fac38ab11344392eadb7462a9
-
SHA256
2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
-
SHA512
9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d
-
SSDEEP
3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby
Malware Config
Extracted
xenorat
174.60.140.164
Xeno_rat_nd8912f
-
delay
5000
-
install_path
appdata
-
port
7707
-
startup_name
TransAgenda
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 TransAgenda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4448 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3580 wrote to memory of 2684 3580 TransAgenda.exe 74 PID 3580 wrote to memory of 2684 3580 TransAgenda.exe 74 PID 3580 wrote to memory of 2684 3580 TransAgenda.exe 74 PID 2684 wrote to memory of 4448 2684 TransAgenda.exe 75 PID 2684 wrote to memory of 4448 2684 TransAgenda.exe 75 PID 2684 wrote to memory of 4448 2684 TransAgenda.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"C:\Users\Admin\AppData\Local\Temp\TransAgenda.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"C:\Users\Admin\AppData\Roaming\XenoManager\TransAgenda.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "TransAgenda" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7BF6.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
1KB
MD5a9c1f7e3003f94a8c0313a0dc0724247
SHA1c175bfbdeed865347102f9f709808ab69ef558f5
SHA2568847403fa9782db190ff467a63a6d84af09ad173a4fed107a9b11aee0cf26e26
SHA512fc86570456b8d7f1f01c5f8580ace3c627e7368640c704471787831bd58829ce99ee7f0a6cfea601f9038602e4988f769a16e4016790af76431d6ccb54983b37
-
Filesize
127KB
MD58dbebef8a47ea96ceed4408641e195ce
SHA1b13a236bdf60de5fac38ab11344392eadb7462a9
SHA2562bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d
SHA5129159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d