Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2023, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
loaderx.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
loaderx.exe
Resource
win10v2004-20230220-en
General
-
Target
loaderx.exe
-
Size
2.8MB
-
MD5
0ad824c9898657a25c9fc6d2239764d8
-
SHA1
491739333a928871bd1ec9c86f46116ad9ca1bdc
-
SHA256
159376c3144f2abccd38d80c5cd69d18cd45232ae807b64292f213634f2087c1
-
SHA512
8b0f2844eef456a3bf1a99aaa30f7670dfd2a9c94990f2a73695e10d4345f6a556f69b93b1873075bda6d8bc4f6f3d3a6d08f6c8ef8e51f3a185584bc4477a0e
-
SSDEEP
49152:hKQ9qcpXi6MSrzysY4bpzrLgAA8NRJFRgT/g:hKs
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 804 1332 loaderx.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1196 powershell.exe 1332 loaderx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1196 powershell.exe Token: SeDebugPrivilege 1332 loaderx.exe Token: SeDebugPrivilege 804 InstallUtil.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1196 1332 loaderx.exe 28 PID 1332 wrote to memory of 1196 1332 loaderx.exe 28 PID 1332 wrote to memory of 1196 1332 loaderx.exe 28 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 PID 1332 wrote to memory of 804 1332 loaderx.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\loaderx.exe"C:\Users\Admin\AppData\Local\Temp\loaderx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d