Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
MSNTRO~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MSNTRO~1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
msndll.exe
Resource
win7-20240903-en
General
-
Target
msndll.exe
-
Size
119KB
-
MD5
444af42eedf1678eba46eb04aa3310dd
-
SHA1
7e3d7e95820dce4ed0b2775123513fe40463332b
-
SHA256
438e621864ee31ab757e92ef4e5120d2a8142fcd650d10f992cedfa236ea3064
-
SHA512
b7656360ff7556589e20bc9dea5fe58dafd1e1ed7546892ce5fbadb84d24a15a234251729272a3730f42a870b8d16e87f52946a657a9272ff92a8dbedebf8d2e
-
SSDEEP
1536:pOF7+/JyYNWJ85KSUav8lnpmVdhcHgWm1o+Uam5w01yKb:pOFS/IYNWSwSUZmnmAr157m5Z1/
Malware Config
Extracted
xtremerat
mikropbisey.no-ip.biz
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral3/memory/1784-6-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral3/memory/1784-5-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral3/memory/2308-9-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral3/memory/1784-10-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral3/memory/2308-11-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 1784 2356 msndll.exe 30 -
resource yara_rule behavioral3/memory/1784-4-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/1784-6-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/1784-2-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/1784-5-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/2308-9-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/1784-10-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral3/memory/2308-11-0x0000000010000000-0x000000001004B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msndll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msndll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 msndll.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 2356 wrote to memory of 1784 2356 msndll.exe 30 PID 1784 wrote to memory of 2308 1784 msndll.exe 31 PID 1784 wrote to memory of 2308 1784 msndll.exe 31 PID 1784 wrote to memory of 2308 1784 msndll.exe 31 PID 1784 wrote to memory of 2308 1784 msndll.exe 31 PID 1784 wrote to memory of 2308 1784 msndll.exe 31 PID 1784 wrote to memory of 2020 1784 msndll.exe 32 PID 1784 wrote to memory of 2020 1784 msndll.exe 32 PID 1784 wrote to memory of 2020 1784 msndll.exe 32 PID 1784 wrote to memory of 2020 1784 msndll.exe 32 PID 1784 wrote to memory of 2020 1784 msndll.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\msndll.exe"C:\Users\Admin\AppData\Local\Temp\msndll.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\msndll.exeC:\Users\Admin\AppData\Local\Temp\msndll.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2020
-
-