Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/10/2024, 05:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/fzwsKD
Resource
win11-20241007-en
General
-
Target
https://gofile.io/d/fzwsKD
Malware Config
Extracted
xenorat
192.168.1.88
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
54710
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/files/0x001f00000002aadb-69.dat family_xenorat behavioral1/memory/1944-82-0x0000000000560000-0x0000000000572000-memory.dmp family_xenorat -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1944 Xeno.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\Xeno.exe:Zone.Identifier chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133731845443213878" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Xeno.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 2476 3392 chrome.exe 77 PID 3392 wrote to memory of 2476 3392 chrome.exe 77 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2392 3392 chrome.exe 78 PID 3392 wrote to memory of 2812 3392 chrome.exe 79 PID 3392 wrote to memory of 2812 3392 chrome.exe 79 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80 PID 3392 wrote to memory of 6088 3392 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/fzwsKD1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4a6ccc40,0x7ffc4a6ccc4c,0x7ffc4a6ccc582⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1728 /prefetch:22⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4076,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4240,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4976,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5084,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3240,i,10351491861665172716,10881439520278712334,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1952
-
-
C:\Users\Admin\Downloads\Xeno.exe"C:\Users\Admin\Downloads\Xeno.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5479d3afae0aabe1a0d9df18086bca9bf
SHA1a3ab8172a0d9311d22da630b41f124862e6c1bb2
SHA2566a72ae70180fb620cb45943bbce7e2c64613e81a0533be10f28228dfa7a589a5
SHA5128357e0aad4e9ef61371b9571819d6cb23842c73461b79e4e1a5e093ea1cb2d2fd7e075362aa2e33c557e1a83c8736ef608988dc35501afa819917858463f6ef2
-
Filesize
3KB
MD57aa534338c4132bde3c05482c6c9ddc0
SHA16d3ffaeeb2451113a7960cd7a9377e34044d5fb8
SHA256a60bb6d593af210ac5919407fa7a887a981a3ec8f95b5feeda1453fda7192381
SHA512252f8866ad7b947b04851d03191ad36107dcb9739a8d4c3acbff1e9b34877bdb68db98c0a02f33314b8649b75ef1f5847352fe2681e16003178e3e21604b2ff3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD500b51123e8bb112d50ae19d9ab1f2f9f
SHA1236499ee432116422d5a2c9b5e3083a3081f36ba
SHA256695767f6b8e8f78ff040939ecb26850283e8ab7a829c57a4f3b3749b14b98a39
SHA51225bb0241b6d47a55cf00216f3ee5a775aead21ffe5cd0a4beac4c4d63efee8b4193fd61b378ca26619843178d265321ed3f51828f7f225d3f2c907c97420b49a
-
Filesize
8KB
MD5f2608f53fec727292198ef02ed10c8f6
SHA1f39f855ad47ef19f65747f80f0845e058e4a1fa4
SHA2560bd683a8e5020abc4bbed69dd5f7f57e3214cdb4da55dc0636693a89ef1d6726
SHA512e11f874ae999b5d83392b2b4df8edcf81ad94ad817528e95fe5a674aabd0a9d228e9acc409bc4de144f080acd55ed2bc7c5cd4eccb3d04ffa3c6e67a8ed09fdf
-
Filesize
228KB
MD58ec3cd1fdaabd8f08391f803e3a147a1
SHA1ce7a784b00afbf6f49b43563ce5824f94dda8b28
SHA256bb2e12031e2f4902c4cd5359b6782008697ab9c7401d858200b5d2bf18d89d42
SHA51205307d769adb3ef31aae217ddaed1cbd99f36f902cf3a2fd59d75ce860ac87a7d0ecda4068e8ea3bb5b15b74c9dbc362a64be1f19e02aed05a3b08e3e775493b
-
Filesize
228KB
MD5573c2fb4bcad501317c7e0740df272a2
SHA1e8d8d50ef8c5521e45def90739bf0414c86e1476
SHA256f5abe02ec2ebad324c22a1eb53789ff78b119238843a3a4a848799de0c90ff97
SHA512600d3a3b60391de71fdd0c85c221d9e51bf7cbb3a572072379ebfef8e2a049a44a0a7f7741c3de8c5f973f5e0743ab64f780f6b249b776f2c84061a62ecc340e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
45KB
MD57a3b28f412c9cc6c9d6c30cce8e7c0bc
SHA1afeb0bf2a0618701c0e8f25fe5905b8e0ae0da0b
SHA25684f1754b8db0c2b85a04e1b80f0b1f5aba825c7ce500edf5d33e9495638257a3
SHA5129800a057b6e9ba328686a171ee9a5252af0659c661b0713c0149a4eff22607ac29a115e2f1fd507eab35ef8c192cb9c5b6e96262e12cff33284bbd643ace9b45
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98