Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
MSNTRO~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MSNTRO~1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
msndll.exe
Resource
win7-20240903-en
General
-
Target
msndll.exe
-
Size
119KB
-
MD5
444af42eedf1678eba46eb04aa3310dd
-
SHA1
7e3d7e95820dce4ed0b2775123513fe40463332b
-
SHA256
438e621864ee31ab757e92ef4e5120d2a8142fcd650d10f992cedfa236ea3064
-
SHA512
b7656360ff7556589e20bc9dea5fe58dafd1e1ed7546892ce5fbadb84d24a15a234251729272a3730f42a870b8d16e87f52946a657a9272ff92a8dbedebf8d2e
-
SSDEEP
1536:pOF7+/JyYNWJ85KSUav8lnpmVdhcHgWm1o+Uam5w01yKb:pOFS/IYNWSwSUZmnmAr157m5Z1/
Malware Config
Extracted
xtremerat
mikropbisey.no-ip.biz
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral4/memory/1536-5-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral4/memory/1164-7-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral4/memory/1536-8-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat behavioral4/memory/1164-9-0x0000000010000000-0x000000001004B000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4308 set thread context of 1536 4308 msndll.exe 83 -
resource yara_rule behavioral4/memory/1536-2-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1536-4-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1536-5-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1536-6-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1164-7-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1536-8-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral4/memory/1164-9-0x0000000010000000-0x000000001004B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 60 1164 WerFault.exe 84 4468 1164 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msndll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msndll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4308 msndll.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 4308 wrote to memory of 1536 4308 msndll.exe 83 PID 1536 wrote to memory of 1164 1536 msndll.exe 84 PID 1536 wrote to memory of 1164 1536 msndll.exe 84 PID 1536 wrote to memory of 1164 1536 msndll.exe 84 PID 1536 wrote to memory of 1164 1536 msndll.exe 84 PID 1536 wrote to memory of 3480 1536 msndll.exe 85 PID 1536 wrote to memory of 3480 1536 msndll.exe 85 PID 1536 wrote to memory of 3480 1536 msndll.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\msndll.exe"C:\Users\Admin\AppData\Local\Temp\msndll.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\msndll.exeC:\Users\Admin\AppData\Local\Temp\msndll.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 4804⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 5004⤵
- Program crash
PID:4468
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1164 -ip 11641⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1164 -ip 11641⤵PID:4052