Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
9Executor/M...re.dll
windows7-x64
1Executor/M...re.dll
windows10-2004-x64
1Executor/M...ms.dll
windows7-x64
1Executor/M...ms.dll
windows10-2004-x64
1Executor/Xeno.exe
windows7-x64
10Executor/Xeno.exe
windows10-2004-x64
10Executor/l...pi.dll
windows7-x64
3Executor/l...pi.dll
windows10-2004-x64
3Executor/s...Dex.js
windows7-x64
3Executor/s...Dex.js
windows10-2004-x64
3Executor/s...eld.js
windows7-x64
3Executor/s...eld.js
windows10-2004-x64
3Executor/s...Env.js
windows7-x64
3Executor/s...Env.js
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 04:29
Behavioral task
behavioral1
Sample
Executor/Microsoft.Web.WebView2.Core.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Executor/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Executor/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Executor/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Executor/Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Executor/Xeno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Executor/locales/bin/api.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Executor/locales/bin/api.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Executor/scripts/Dex.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Executor/scripts/Dex.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Executor/scripts/Infinite Yield.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Executor/scripts/Infinite Yield.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Executor/scripts/UNCCheckEnv.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Executor/scripts/UNCCheckEnv.js
Resource
win10v2004-20241007-en
General
-
Target
Executor/Xeno.exe
-
Size
940KB
-
MD5
8cd91466705ef28b8a6d182630c60b50
-
SHA1
8c0c79da29454ceb0735a118c44ae13d75e6f005
-
SHA256
8ca88570597b59e3b7130ce6e5ffe5a238f053abd8d3b65ec4288ca8cd87a8f7
-
SHA512
56341bb425ff3e30a7aa4319cbd916c2f1ff6d61aa3a9c8d8c5375f8df27711cac4474b1cf646afe19e38adb2aabd4a4c96ac0009d4d448d1c2dd9e79c18088f
-
SSDEEP
24576:8hkCmQkV1bP02HbRX2AZj6egjU9TX28kptc0tCqE:86CvkV1bP02HbGegjKWPconE
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/1280-1-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4708 set thread context of 1280 4708 Xeno.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1280 MSBuild.exe 1280 MSBuild.exe 1280 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1280 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84 PID 4708 wrote to memory of 1280 4708 Xeno.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Executor\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Executor\Xeno.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-