Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 20:47 UTC

General

  • Target

    XenoPatch.exe

  • Size

    7.5MB

  • MD5

    3ea0aeead230da875bedd31537fcbc62

  • SHA1

    c260e354d3a8ffeeeb6afb0b126c7940f87d10b6

  • SHA256

    7ff6f9e74cfb20dc94e9411e75ed1517c95eecb7633ebcb97d8b90ba789bbfa5

  • SHA512

    c4b4813075360dea0bf470fc0aef02c83e5b4dffac0b2a26e18a7732557f32f0e05f6d21dba76494e56de91ca7d1548fb7f07a761450bf91cdb9bf31c34ef380

  • SSDEEP

    196608:2CgFI3wfI9jUC2gYBYv3vbWY+iITm1U6fd1EI:OFxIH2gYBgDW/TOzb/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe
    "C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe
      "C:\Users\Admin\AppData\Local\Temp\XenoPatch.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      PID:2500
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a79758,0x7fef6a79768,0x7fef6a79778
      2⤵
        PID:2740
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:2
        2⤵
          PID:2992
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:8
          2⤵
            PID:528
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:8
            2⤵
              PID:2248
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:1
              2⤵
                PID:2388
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:1
                2⤵
                  PID:1184
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2796 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:2
                  2⤵
                    PID:788
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1412,i,4234485860580074494,2200628372650221322,131072 /prefetch:1
                    2⤵
                      PID:1716
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:544

                    Network

                    • flag-us
                      DNS
                      www.google.com
                      chrome.exe
                      Remote address:
                      8.8.8.8:53
                      Request
                      www.google.com
                      IN A
                      Response
                      www.google.com
                      IN A
                      142.250.187.196
                    • flag-gb
                      GET
                      https://www.google.com/async/ddljson?async=ntp:2
                      chrome.exe
                      Remote address:
                      142.250.187.196:443
                      Request
                      GET /async/ddljson?async=ntp:2 HTTP/2.0
                      host: www.google.com
                      sec-fetch-site: none
                      sec-fetch-mode: no-cors
                      sec-fetch-dest: empty
                      user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                      accept-encoding: gzip, deflate, br
                      accept-language: en-US,en;q=0.9
                    • flag-gb
                      GET
                      https://www.google.com/async/newtab_promos
                      chrome.exe
                      Remote address:
                      142.250.187.196:443
                      Request
                      GET /async/newtab_promos HTTP/2.0
                      host: www.google.com
                      sec-fetch-site: cross-site
                      sec-fetch-mode: no-cors
                      sec-fetch-dest: empty
                      user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                      accept-encoding: gzip, deflate, br
                      accept-language: en-US,en;q=0.9
                    • flag-gb
                      GET
                      https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                      chrome.exe
                      Remote address:
                      142.250.187.196:443
                      Request
                      GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
                      host: www.google.com
                      x-client-data: COLsygE=
                      sec-fetch-site: cross-site
                      sec-fetch-mode: no-cors
                      sec-fetch-dest: empty
                      user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                      accept-encoding: gzip, deflate, br
                      accept-language: en-US,en;q=0.9
                    • 142.250.187.196:443
                      https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                      tls, http2
                      chrome.exe
                      2.2kB
                      9.8kB
                      22
                      24

                      HTTP Request

                      GET https://www.google.com/async/ddljson?async=ntp:2

                      HTTP Request

                      GET https://www.google.com/async/newtab_promos

                      HTTP Request

                      GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                    • 142.250.187.196:443
                      www.google.com
                      tls, http2
                      chrome.exe
                      999 B
                      5.6kB
                      9
                      8
                    • 142.250.187.196:443
                      www.google.com
                      tls, http2
                      chrome.exe
                      999 B
                      5.6kB
                      9
                      8
                    • 8.8.8.8:53
                      www.google.com
                      dns
                      chrome.exe
                      60 B
                      76 B
                      1
                      1

                      DNS Request

                      www.google.com

                      DNS Response

                      142.250.187.196

                    • 142.250.187.196:443
                      www.google.com
                      https
                      chrome.exe
                      4.5kB
                      17.6kB
                      19
                      21

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\09970408-7cfd-4a00-9a36-926bdca29b21.tmp

                      Filesize

                      346KB

                      MD5

                      a01713e0c42ac226492ebb5ae4098ca6

                      SHA1

                      c8f84b80aa2c8d5ad3221061f0873edcbfd38a30

                      SHA256

                      7311790b546c0260a76cbc1be94f438f076eeaa4bfb6a9313413f2c9dd379ff1

                      SHA512

                      f0152cc6ee3faec126d6b2175560ba312962012744da53f16870131f4cdd66550fbf73d6505f4ec02a2fb3e6a4109f59d641449739237d78aab0f21eb5cb984c

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                      Filesize

                      264KB

                      MD5

                      f50f89a0a91564d0b8a211f8921aa7de

                      SHA1

                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                      SHA256

                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                      SHA512

                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                      Filesize

                      16B

                      MD5

                      18e723571b00fb1694a3bad6c78e4054

                      SHA1

                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                      SHA256

                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                      SHA512

                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                      Filesize

                      170KB

                      MD5

                      a4ed99d235aa35abe4432bb4dc6fcbde

                      SHA1

                      1ac5bd86d2ef6d85a5772fc166617e82e6f0bc05

                      SHA256

                      144d579aaf5bc6bb946b0b1a22d6ba2f9a4985e6d7d271ce5c7dc26b9f53a237

                      SHA512

                      91ca8e761b500dbdd8d2302d4b532c0b418d437bc0d7e0918a73f5ec9ced1f4cd93bc70e05379aba84c78653a91a04f1b86757e4abdfe02b56bbb2e3efc5ff33

                    • C:\Users\Admin\AppData\Local\Temp\_MEI21322\python312.dll

                      Filesize

                      1.7MB

                      MD5

                      6f7c42579f6c2b45fe866747127aef09

                      SHA1

                      b9487372fe3ed61022e52cc8dbd37e6640e87723

                      SHA256

                      07642b6a3d99ce88cff790087ac4e2ba0b2da1100cf1897f36e096427b580ee5

                      SHA512

                      aadf06fd6b4e14f600b0a614001b8c31e42d71801adec7c9c177dcbb4956e27617fa45ba477260a7e06d2ca4979ed5acc60311258427ee085e8025b61452acec

                    • memory/2500-23-0x000007FEF5FF0000-0x000007FEF66B5000-memory.dmp

                      Filesize

                      6.8MB

                    We care about your privacy.

                    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.