Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2025, 07:47 UTC

General

  • Target

    JaffaCakes118_6811fb576444744493588618ef27c831.exe

  • Size

    111KB

  • MD5

    6811fb576444744493588618ef27c831

  • SHA1

    aaf907d26f14bd8f5cae499c808ea1dc66d57dcc

  • SHA256

    3592e6d24f86015afec4b94e9d7b037a642a71b11fd27c0083aef8d22257b5f2

  • SHA512

    cce853dc43e1c96d1a0be968b300dec1a23301c34afc5661e6e08cf8f3ab4527d985cff7fbb7945f107127e764908e31a5a85b68253209bf779fa951de151e2b

  • SSDEEP

    3072:DdvVjqqdqqqLJqMPaZ0JKYf5hPSMNWrw7JfPZF7e+U9Fn:DdvVjqqdqqqLJqkdhPYrorK+U

Malware Config

Extracted

Family

xtremerat

C2

mimmo86.no-ip.org

Signatures

  • Detect XtremeRAT payload 5 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6811fb576444744493588618ef27c831.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6811fb576444744493588618ef27c831.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6811fb576444744493588618ef27c831.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6811fb576444744493588618ef27c831.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2776
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1444-20-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/1444-30-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/1444-22-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/1444-23-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/1444-25-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/2576-24-0x0000000000470000-0x000000000048D000-memory.dmp

      Filesize

      116KB

    • memory/2576-16-0x0000000000440000-0x0000000000450000-memory.dmp

      Filesize

      64KB

    • memory/2576-10-0x0000000000380000-0x0000000000390000-memory.dmp

      Filesize

      64KB

    • memory/2576-9-0x0000000000370000-0x0000000000380000-memory.dmp

      Filesize

      64KB

    • memory/2576-8-0x0000000000360000-0x0000000000370000-memory.dmp

      Filesize

      64KB

    • memory/2576-7-0x0000000000350000-0x0000000000360000-memory.dmp

      Filesize

      64KB

    • memory/2576-12-0x00000000003A0000-0x00000000003B0000-memory.dmp

      Filesize

      64KB

    • memory/2576-13-0x00000000003F0000-0x0000000000400000-memory.dmp

      Filesize

      64KB

    • memory/2576-26-0x0000000000400000-0x000000000041C600-memory.dmp

      Filesize

      113KB

    • memory/2576-0-0x0000000000400000-0x000000000041C600-memory.dmp

      Filesize

      113KB

    • memory/2576-15-0x0000000000430000-0x0000000000440000-memory.dmp

      Filesize

      64KB

    • memory/2576-11-0x0000000000390000-0x00000000003A0000-memory.dmp

      Filesize

      64KB

    • memory/2576-6-0x0000000000280000-0x0000000000290000-memory.dmp

      Filesize

      64KB

    • memory/2576-5-0x0000000000270000-0x0000000000280000-memory.dmp

      Filesize

      64KB

    • memory/2576-4-0x0000000000250000-0x0000000000260000-memory.dmp

      Filesize

      64KB

    • memory/2576-2-0x0000000000230000-0x0000000000240000-memory.dmp

      Filesize

      64KB

    • memory/2576-14-0x0000000000420000-0x0000000000430000-memory.dmp

      Filesize

      64KB

    • memory/2576-3-0x0000000000240000-0x0000000000250000-memory.dmp

      Filesize

      64KB

    • memory/2576-1-0x0000000000220000-0x0000000000230000-memory.dmp

      Filesize

      64KB

    • memory/2576-17-0x0000000000450000-0x0000000000460000-memory.dmp

      Filesize

      64KB

    • memory/2776-27-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/2776-29-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    • memory/2776-31-0x0000000010000000-0x000000001004D000-memory.dmp

      Filesize

      308KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.