Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
Ri9RSdOwP2DvMFi.exe
Resource
win7-20231215-en
General
-
Target
Ri9RSdOwP2DvMFi.exe
-
Size
782KB
-
MD5
93fcca51eeb3f566119693d2f9745926
-
SHA1
9cb3c035e948b0e1e27f2a8515fed6deb14857a5
-
SHA256
effde9dee423f050461080a9efc44435f4abd5d772e0a436f84f758b95ff65b2
-
SHA512
978b52d10a3a00429322c21cb492f7f72a1bbe175d3915b37d01d4ecde9b0b66f29228625c1e5abf71ad3b5110f9021059c5daaa8f7ea25b5fb7e641ffb06d85
-
SSDEEP
6144:luFJLgGJz99KYyo3wdTPnoJx6DqVY2RvE/KMuKszf7hOgoP2Oncbq3VHOflCbF23:KzfDyvnGmqvs/5YOgoZsHYMaPVUnt
Malware Config
Extracted
xloader
2.3
b5ne
haridwarweb.com
rltzjd.com
betsvia.com
swiftnestit.com
sndebate.com
intervene-suave.net
frejany.com
findcremationsearcher.info
jchmlt.com
sanenkj.com
donnypoppins.com
pallainfotech.com
dinerbite.com
aj2223.online
4ociousdragon.com
rnpackersandmovers.com
working-mum.com
savewife.com
reissteams.com
visionenterprisesindia.com
amazoneoez.xyz
plsliveevent.com
iumboprivacy.com
3305broderick.com
advertswise.com
polomedicine.com
guyelangguo.com
dyslexic-entrepreneur.com
originalgolfer.club
bloggerms.info
motownbakery.com
rush8t.com
nycperioapp.com
summercamp.world
nxbinus.com
destravamulher.com
gastlawyers.com
wogbi.com
binskehr.com
thepivotisreal.com
yourprivateresort.info
yingcharoen2017.com
bulkproofxns.xyz
profisvet.com
whiteandgraystone.com
find-xiaomi-today.cloud
admin11.com
dudaolin.com
hrb-friend.com
yorbaregional.com
serviciosinformaticosjose.com
rootsnglam.com
topvegasspanv.com
tgirmerch.com
cheatmopro.xyz
shopthoitranghana.com
qwik-hire.com
steamcommunityhub.info
fcaimage.com
vincentcpn.com
falconrysport.com
duobaocloud.net
dstshopping.com
limhontology.com
amarilisreyes.com
Signatures
-
Xloader payload 5 IoCs
resource yara_rule behavioral2/memory/3016-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3016-22-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3016-26-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/444-34-0x0000000000760000-0x0000000000788000-memory.dmp xloader behavioral2/memory/444-36-0x0000000000760000-0x0000000000788000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation Ri9RSdOwP2DvMFi.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 228 set thread context of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 3016 set thread context of 3352 3016 Ri9RSdOwP2DvMFi.exe 78 PID 3016 set thread context of 3352 3016 Ri9RSdOwP2DvMFi.exe 78 PID 444 set thread context of 3352 444 msiexec.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 228 Ri9RSdOwP2DvMFi.exe 228 Ri9RSdOwP2DvMFi.exe 228 Ri9RSdOwP2DvMFi.exe 228 Ri9RSdOwP2DvMFi.exe 228 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe 444 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 3016 Ri9RSdOwP2DvMFi.exe 444 msiexec.exe 444 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 228 Ri9RSdOwP2DvMFi.exe Token: SeDebugPrivilege 3016 Ri9RSdOwP2DvMFi.exe Token: SeDebugPrivilege 444 msiexec.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 228 wrote to memory of 2324 228 Ri9RSdOwP2DvMFi.exe 103 PID 228 wrote to memory of 2324 228 Ri9RSdOwP2DvMFi.exe 103 PID 228 wrote to memory of 2324 228 Ri9RSdOwP2DvMFi.exe 103 PID 228 wrote to memory of 100 228 Ri9RSdOwP2DvMFi.exe 105 PID 228 wrote to memory of 100 228 Ri9RSdOwP2DvMFi.exe 105 PID 228 wrote to memory of 100 228 Ri9RSdOwP2DvMFi.exe 105 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 228 wrote to memory of 3016 228 Ri9RSdOwP2DvMFi.exe 106 PID 3352 wrote to memory of 444 3352 Explorer.EXE 107 PID 3352 wrote to memory of 444 3352 Explorer.EXE 107 PID 3352 wrote to memory of 444 3352 Explorer.EXE 107 PID 444 wrote to memory of 1168 444 msiexec.exe 108 PID 444 wrote to memory of 1168 444 msiexec.exe 108 PID 444 wrote to memory of 1168 444 msiexec.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\raWKsgTnHRZckF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3FA4.tmp"3⤵
- Creates scheduled task(s)
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"3⤵PID:100
-
-
C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ri9RSdOwP2DvMFi.exe"3⤵PID:1168
-
-