Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/01/2023, 20:38
Behavioral task
behavioral1
Sample
SWhs.exe
Resource
win7-20220812-en
General
-
Target
SWhs.exe
-
Size
160KB
-
MD5
9b39457703898f689b0e92a03d3408bf
-
SHA1
12cfebd737b58e1d961f226e087716ff38c420d3
-
SHA256
163e4dd4d77797c1b788c03c0f71911d2181573bdf4f048e953563b072a234c6
-
SHA512
73d7983c9582b28fff9044e328d6358c27a00aa687694e695a1f52c74d2eb43cd5674af6ad8c00b54fbdaa1c54896d1d775f529244f749f18c570713c3e24fa9
-
SSDEEP
3072:EhhrDpv/3jb+Na8dZL9My3BhYpm16G5tKartyetVTeH+QRRnNxm4s:E3gpF9NxhEm1j5tXrYette/nF
Malware Config
Extracted
xloader
2.3
pzb5
laceez-store.com
fastcobra.icu
adust.site
parcelpunk.com
dabanse.info
themacshisha.com
ketogenic-success.com
simplyrip.com
antoniolima.icu
ruyakeji.net
sysintegrados2.com
triangle-resolute.com
muratkivrak.com
ntwrkrecs.com
gtxhcntq.icu
charlottepromo.com
trygreenbar.com
abbathandhottub.com
sliim-up.com
hoteldeleauvive.com
itsunnyinflorida.com
stukeyenterprise.com
texasmarijuanadispensary.com
makemestupid.com
wrapcare.info
elevencasual.com
berrymaps.com
eufootball.xyz
guiatrompeta.com
dlinteriordesigns.com
vseboliit.life
akoocg.com
liselibrary.com
strikeoutchallenge.com
blenheimdesigns.com
largeprintonline.com
nevillwearsprada.com
elyonbosstimer.com
bfjgktv.com
cybermovistar.com
morenosappliancerepair.com
sqxiandai.com
haneen-ts.com
askjiaju.net
soyalbalucia.com
mycounsellinghk.com
influentexports.com
disarmsales.com
sproutone.com
clasifood.com
gigafoon.com
donorsflames.store
clinique-alhanane.com
interdomiciliocanarias.com
modestin.online
magicisntreal.com
desibeast.com
thefreelanceteam.net
trendingproductus.com
bramwalda.com
fabriq-s.com
chaoticscave.net
7thenglish.com
howtogetmyboyfriendback.net
keprom.works
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3820-196-0x0000000002390000-0x00000000023B9000-memory.dmp xloader behavioral2/memory/3820-201-0x0000000002390000-0x00000000023B9000-memory.dmp xloader behavioral2/memory/3820-202-0x0000000003F90000-0x000000000412A000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2692 set thread context of 2068 2692 SWhs.exe 40 PID 3820 set thread context of 2068 3820 msiexec.exe 40 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2692 SWhs.exe 2692 SWhs.exe 2692 SWhs.exe 2692 SWhs.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe 3820 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2692 SWhs.exe 2692 SWhs.exe 2692 SWhs.exe 3820 msiexec.exe 3820 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 SWhs.exe Token: SeDebugPrivilege 3820 msiexec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3820 2068 Explorer.EXE 66 PID 2068 wrote to memory of 3820 2068 Explorer.EXE 66 PID 2068 wrote to memory of 3820 2068 Explorer.EXE 66 PID 3820 wrote to memory of 4364 3820 msiexec.exe 67 PID 3820 wrote to memory of 4364 3820 msiexec.exe 67 PID 3820 wrote to memory of 4364 3820 msiexec.exe 67
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\SWhs.exe"C:\Users\Admin\AppData\Local\Temp\SWhs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SWhs.exe"3⤵PID:4364
-
-