Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/02/2025, 23:05
Behavioral task
behavioral1
Sample
b1881827f723ef2c8935689a421936ad.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b1881827f723ef2c8935689a421936ad.exe
Resource
win10v2004-20250207-en
General
-
Target
b1881827f723ef2c8935689a421936ad.exe
-
Size
45KB
-
MD5
b1881827f723ef2c8935689a421936ad
-
SHA1
a6fa2abdc15590c147f22b051e47fd0e9ea47375
-
SHA256
bf11a0220b7cbe0f09af2e354d3858f9c50aacfd982260128fdf85f37f48ffb2
-
SHA512
51da6d469bf34e69ef6eb76794615890b14e4bfa5be4e3d1615d6efef13b72a72e954bce2b87591d549e9e5e9f17a5e64689796370487393fad50b9a18e5d544
-
SSDEEP
768:FdhO/poiiUcjlJIn9hYH9Xqk5nWEZ5SbTDa6uI7CPW5H:bw+jjgn9SH9XqcnW85SbT/uI/
Malware Config
Extracted
xenorat
failed2.myftp.org
Winsock2Mutex
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
start.exe
Signatures
-
Detect XenoRat Payload 4 IoCs
resource yara_rule behavioral1/memory/2204-1-0x0000000000840000-0x0000000000852000-memory.dmp family_xenorat behavioral1/files/0x0006000000019240-4.dat family_xenorat behavioral1/memory/2100-9-0x00000000001F0000-0x0000000000202000-memory.dmp family_xenorat behavioral1/memory/2100-16-0x00000000064D0000-0x00000000065CA000-memory.dmp family_xenorat -
Xenorat family
-
Executes dropped EXE 1 IoCs
pid Process 2100 b1881827f723ef2c8935689a421936ad.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 b1881827f723ef2c8935689a421936ad.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1881827f723ef2c8935689a421936ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1881827f723ef2c8935689a421936ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe 2100 b1881827f723ef2c8935689a421936ad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 b1881827f723ef2c8935689a421936ad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2100 2204 b1881827f723ef2c8935689a421936ad.exe 31 PID 2204 wrote to memory of 2100 2204 b1881827f723ef2c8935689a421936ad.exe 31 PID 2204 wrote to memory of 2100 2204 b1881827f723ef2c8935689a421936ad.exe 31 PID 2204 wrote to memory of 2100 2204 b1881827f723ef2c8935689a421936ad.exe 31 PID 2100 wrote to memory of 2804 2100 b1881827f723ef2c8935689a421936ad.exe 32 PID 2100 wrote to memory of 2804 2100 b1881827f723ef2c8935689a421936ad.exe 32 PID 2100 wrote to memory of 2804 2100 b1881827f723ef2c8935689a421936ad.exe 32 PID 2100 wrote to memory of 2804 2100 b1881827f723ef2c8935689a421936ad.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1881827f723ef2c8935689a421936ad.exe"C:\Users\Admin\AppData\Local\Temp\b1881827f723ef2c8935689a421936ad.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\XenoManager\b1881827f723ef2c8935689a421936ad.exe"C:\Users\Admin\AppData\Roaming\XenoManager\b1881827f723ef2c8935689a421936ad.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "start.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ab952ba958e29e1752b3eb1c03eb2df
SHA19a32ca0c1cf2688f1e0cd6e727fbbb4c252997d9
SHA256104a6cf693fcc2a3df809c0a806f0648f5e2018b45583624ad6aebc20619c867
SHA512a443aba4d2a0da9228230c91a151460df3df60289df19542070c3fa38652dc75bb8941fc72628ec1ae13787bf375c1b813774d9b3ea53e8f3af81ca01f0c1a7e
-
Filesize
45KB
MD5b1881827f723ef2c8935689a421936ad
SHA1a6fa2abdc15590c147f22b051e47fd0e9ea47375
SHA256bf11a0220b7cbe0f09af2e354d3858f9c50aacfd982260128fdf85f37f48ffb2
SHA51251da6d469bf34e69ef6eb76794615890b14e4bfa5be4e3d1615d6efef13b72a72e954bce2b87591d549e9e5e9f17a5e64689796370487393fad50b9a18e5d544