Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2025, 23:05

General

  • Target

    b1881827f723ef2c8935689a421936ad.exe

  • Size

    45KB

  • MD5

    b1881827f723ef2c8935689a421936ad

  • SHA1

    a6fa2abdc15590c147f22b051e47fd0e9ea47375

  • SHA256

    bf11a0220b7cbe0f09af2e354d3858f9c50aacfd982260128fdf85f37f48ffb2

  • SHA512

    51da6d469bf34e69ef6eb76794615890b14e4bfa5be4e3d1615d6efef13b72a72e954bce2b87591d549e9e5e9f17a5e64689796370487393fad50b9a18e5d544

  • SSDEEP

    768:FdhO/poiiUcjlJIn9hYH9Xqk5nWEZ5SbTDa6uI7CPW5H:bw+jjgn9SH9XqcnW85SbT/uI/

Malware Config

Extracted

Family

xenorat

C2

failed2.myftp.org

Mutex

Winsock2Mutex

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    start.exe

Signatures

  • Detect XenoRat Payload 4 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1881827f723ef2c8935689a421936ad.exe
    "C:\Users\Admin\AppData\Local\Temp\b1881827f723ef2c8935689a421936ad.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Roaming\XenoManager\b1881827f723ef2c8935689a421936ad.exe
      "C:\Users\Admin\AppData\Roaming\XenoManager\b1881827f723ef2c8935689a421936ad.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "start.exe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFA18.tmp

    Filesize

    1KB

    MD5

    6ab952ba958e29e1752b3eb1c03eb2df

    SHA1

    9a32ca0c1cf2688f1e0cd6e727fbbb4c252997d9

    SHA256

    104a6cf693fcc2a3df809c0a806f0648f5e2018b45583624ad6aebc20619c867

    SHA512

    a443aba4d2a0da9228230c91a151460df3df60289df19542070c3fa38652dc75bb8941fc72628ec1ae13787bf375c1b813774d9b3ea53e8f3af81ca01f0c1a7e

  • \Users\Admin\AppData\Roaming\XenoManager\b1881827f723ef2c8935689a421936ad.exe

    Filesize

    45KB

    MD5

    b1881827f723ef2c8935689a421936ad

    SHA1

    a6fa2abdc15590c147f22b051e47fd0e9ea47375

    SHA256

    bf11a0220b7cbe0f09af2e354d3858f9c50aacfd982260128fdf85f37f48ffb2

    SHA512

    51da6d469bf34e69ef6eb76794615890b14e4bfa5be4e3d1615d6efef13b72a72e954bce2b87591d549e9e5e9f17a5e64689796370487393fad50b9a18e5d544

  • memory/2100-9-0x00000000001F0000-0x0000000000202000-memory.dmp

    Filesize

    72KB

  • memory/2100-10-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2100-13-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2100-14-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2100-15-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2100-16-0x00000000064D0000-0x00000000065CA000-memory.dmp

    Filesize

    1000KB

  • memory/2204-0-0x0000000074B2E000-0x0000000074B2F000-memory.dmp

    Filesize

    4KB

  • memory/2204-1-0x0000000000840000-0x0000000000852000-memory.dmp

    Filesize

    72KB