Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/01/2025, 00:12 UTC
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20241007-en
General
-
Target
test.exe
-
Size
45KB
-
MD5
21645270a894666d3b1907b66ddd147f
-
SHA1
bfd5061be263edd2de98d17fb989a408fa7117b9
-
SHA256
567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e
-
SHA512
84ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e
-
SSDEEP
768:tdhO/poiiUcjlJInuzH9Xqk5nWEZ5SbTDa0WI7CPW5/:jw+jjgnsH9XqcnW85SbTNWIX
Malware Config
Extracted
xenorat
24.ip.gl.ply.gg
Xeno_rat_nd8912d
-
delay
3000
-
install_path
appdata
-
port
64438
-
startup_name
cmd
Signatures
-
Detect XenoRat Payload 3 IoCs
resource yara_rule behavioral2/memory/1644-1-0x0000000000290000-0x00000000002A2000-memory.dmp family_xenorat behavioral2/files/0x001c00000002aaaf-6.dat family_xenorat behavioral2/memory/1248-20-0x00000000008C0000-0x00000000008CA000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 1248 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe 1248 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1248 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1248 1644 test.exe 78 PID 1644 wrote to memory of 1248 1644 test.exe 78 PID 1644 wrote to memory of 1248 1644 test.exe 78 PID 1248 wrote to memory of 3376 1248 test.exe 79 PID 1248 wrote to memory of 3376 1248 test.exe 79 PID 1248 wrote to memory of 3376 1248 test.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"C:\Users\Admin\AppData\Roaming\XenoManager\test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "cmd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB0B2.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3376
-
-
Network
-
Remote address:8.8.8.8:53Request24.ip.gl.ply.ggIN AResponse24.ip.gl.ply.ggIN A147.185.221.24
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request24.221.185.147.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.229.43
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
931 B 836 B 14 14
-
3.7kB 5.1kB 59 99
-
3.4kB 3.0kB 41 57
-
1.1kB 10.7kB 19 20
-
848 B 752 B 11 11
-
98 B 52 B 2 1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD51294de804ea5400409324a82fdc7ec59
SHA19a39506bc6cadf99c1f2129265b610c69d1518f7
SHA256494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0
SHA512033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1
-
Filesize
1KB
MD5d14add5bc544dc56500dab4dcc70f120
SHA1626a696608ee981a0e8d6bde221c0dcb961c2644
SHA256e549e2fef562f01fc2d18ba0b34521bb6f87ba4ca0dcfc82002c9dfcffa07ad0
SHA5123a19b6d12218a2e66dab2175098a392a8ec489711852a05542e3a156876fb1b0a0806ee5839741a196117d111ef5ea2a0562c7999eab3861f5f81ba9c03098db
-
Filesize
45KB
MD521645270a894666d3b1907b66ddd147f
SHA1bfd5061be263edd2de98d17fb989a408fa7117b9
SHA256567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e
SHA51284ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e