Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 13:26 UTC

General

  • Target

    vware.exe

  • Size

    45KB

  • MD5

    42faf67435979c1245010683d8e916b5

  • SHA1

    b93b780736398c6e4001c150276ccb24982ed67f

  • SHA256

    eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd

  • SHA512

    ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86

  • SSDEEP

    768:RdhO/poiiUcjlJInvvH9Xqk5nWEZ5SbTDaJWI7CPW5R:Pw+jjgn3H9XqcnW85SbTAWIJ

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\vware.exe
    "C:\Users\Admin\AppData\Local\Temp\vware.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2880

Network

    No results found
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
  • 127.0.0.1:4444
    vware.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2880-0-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

    Filesize

    4KB

  • memory/2880-1-0x0000000001210000-0x0000000001222000-memory.dmp

    Filesize

    72KB

  • memory/2880-2-0x0000000074DC0000-0x00000000754AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2880-3-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

    Filesize

    4KB

  • memory/2880-4-0x0000000074DC0000-0x00000000754AE000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.