Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2024, 01:36 UTC

General

  • Target

    788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971.exe

  • Size

    420KB

  • MD5

    181183e03d22f28ab11be4fea8a2f4f8

  • SHA1

    ce1bee4f17cf2dc38dc82d75b625ed1a0b58c72c

  • SHA256

    788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971

  • SHA512

    10064d5d443ac10f874f5294d34f6ce6ce5d2d352c89b344587c197a3479df24827966ee00fd6194da67caefd7e1f67a5d8a7a0f121c64abbb82e71bbfba85ee

  • SSDEEP

    6144:4+9hS3kbFRQqzfz7qeEzDSZbFm2A2g2McTrDLKmc:XMkHzfz77b62McTOmc

Malware Config

Extracted

Family

xtremerat

C2

sam-of.myq-see.com

Desktopsam-of.publicvm.com

Signatures

  • Detect XtremeRAT payload 4 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971.exe
    "C:\Users\Admin\AppData\Local\Temp\788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2844

Network

  • flag-us
    DNS
    sam-of.myq-see.com
    notepad.exe
    Remote address:
    8.8.8.8:53
    Request
    sam-of.myq-see.com
    IN A
    Response
    sam-of.myq-see.com
    IN A
    208.91.197.132
  • flag-us
    DNS
    sam-of.myq-see.com
    notepad.exe
    Remote address:
    8.8.8.8:53
    Request
    sam-of.myq-see.com
    IN A
    Response
    sam-of.myq-see.com
    IN A
    208.91.197.132
  • flag-us
    DNS
    sam-of.publicvm.com
    notepad.exe
    Remote address:
    8.8.8.8:53
    Request
    sam-of.publicvm.com
    IN A
    Response
    sam-of.publicvm.com
    IN CNAME
    publicvm.com
    publicvm.com
    IN A
    139.99.66.103
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    152 B
    120 B
    3
    3
  • 139.99.66.103:288
    sam-of.publicvm.com
    notepad.exe
    152 B
    3
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    152 B
    120 B
    3
    3
  • 139.99.66.103:288
    sam-of.publicvm.com
    notepad.exe
    152 B
    3
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    152 B
    120 B
    3
    3
  • 139.99.66.103:288
    sam-of.publicvm.com
    notepad.exe
    152 B
    3
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    152 B
    120 B
    3
    3
  • 139.99.66.103:288
    sam-of.publicvm.com
    notepad.exe
    152 B
    3
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    152 B
    120 B
    3
    3
  • 139.99.66.103:288
    sam-of.publicvm.com
    notepad.exe
    152 B
    3
  • 208.91.197.132:288
    sam-of.myq-see.com
    notepad.exe
    52 B
    40 B
    1
    1
  • 8.8.8.8:53
    sam-of.myq-see.com
    dns
    notepad.exe
    128 B
    160 B
    2
    2

    DNS Request

    sam-of.myq-see.com

    DNS Request

    sam-of.myq-see.com

    DNS Response

    208.91.197.132

    DNS Response

    208.91.197.132

  • 8.8.8.8:53
    sam-of.publicvm.com
    dns
    notepad.exe
    65 B
    95 B
    1
    1

    DNS Request

    sam-of.publicvm.com

    DNS Response

    139.99.66.103

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2844-3-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-4-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-10-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-11-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-9-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-2-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-7-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2844-12-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

  • memory/2844-13-0x0000000010000000-0x000000001004D000-memory.dmp

    Filesize

    308KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.