Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
f875ce20d9473d5dd74d2e0382fb32ba.js
Resource
win7-20231215-en
General
-
Target
f875ce20d9473d5dd74d2e0382fb32ba.js
-
Size
311KB
-
MD5
f875ce20d9473d5dd74d2e0382fb32ba
-
SHA1
a9b75554d7cb9eae3f06c2b9f3b7cf60617b32d8
-
SHA256
b71e66c2f3dd88356df6c1bb0cab806156e91bed324c376b45cae58ce051ceff
-
SHA512
1eccb095f0bd41fb28879a726d8257b3a30cc487efa33fe24f2be2899596ee99bc54179d7003493aec50e55f6e6beac77616a9a8d9c3d80e4cb4a0244c33c4fe
-
SSDEEP
6144:X/Rfo2A0XbJtYp+JPNqRvhQoACsix01v8sPgMBZe9c/slHWiqIWvfQwc:mkFtYwPNqRGrCG9rYML/FjvI
Malware Config
Extracted
xloader
2.3
wqos
nobis.one
firecrestfineart.com
zhongqiaolw.com
healthcaremovement.com
amothersloveliberates.com
maskscafe.com
dkukkmk.icu
realmindofmitch.com
cranes-crossing.com
deeplyrootedplants.com
doodlesbakery.com
xiaomagu.com
lactase-enzym.com
comprartecnologia.com
making-my-new-normal.com
ruksamin.com
inforko.com
2mblueprint.com
pinkfang.com
100daysofbush.com
facesculptor3d.com
imdistel.com
vaagencyblueprint.com
ssdigreater.info
lklool.com
robinsrevenge.com
lescoquelicots.paris
mysticandmagician.com
powersmoney.com
baincot3.com
goodlink4freewares.info
assuredbc.com
drsergegauthier.com
esp-mask.com
riadepot.com
uresource.net
blacktielabs.com
hadobit.com
francesjmelhop.com
shansshield.com
justinhighland.com
rixoro.com
lnhujiaoqi.com
menteemethods.com
xn--3ds641adrtfpb.com
sodomytv.com
pkd.xyz
flagi.expert
smartbusiness-31.com
holisticwellnessbyheta.com
xldd0818m75imv22.xyz
studiespullen.club
drheatherbluemel.com
villalacchini.com
eightiestheultimatedecade.com
balkanum.com
thetexthub.com
computoyservicio.com
goghostcbd.com
theartisty.com
7967299.com
2084software.com
everbignt.com
westlakehillsdental.com
shdbwl188.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/files/0x0029000000015da6-8.dat xloader behavioral1/memory/2772-11-0x00000000003A0000-0x00000000003C8000-memory.dmp xloader behavioral1/memory/2944-16-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader behavioral1/memory/2944-19-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zIMOUAQYhg.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zIMOUAQYhg.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 bin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\zIMOUAQYhg.js\"" wscript.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2772 set thread context of 1192 2772 bin.exe 9 PID 2944 set thread context of 1192 2944 NETSTAT.EXE 9 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2944 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2772 bin.exe 2772 bin.exe 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE 2944 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2772 bin.exe 2772 bin.exe 2772 bin.exe 2944 NETSTAT.EXE 2944 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 bin.exe Token: SeDebugPrivilege 2944 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1936 1956 wscript.exe 28 PID 1956 wrote to memory of 1936 1956 wscript.exe 28 PID 1956 wrote to memory of 1936 1956 wscript.exe 28 PID 1956 wrote to memory of 2772 1956 wscript.exe 29 PID 1956 wrote to memory of 2772 1956 wscript.exe 29 PID 1956 wrote to memory of 2772 1956 wscript.exe 29 PID 1956 wrote to memory of 2772 1956 wscript.exe 29 PID 1192 wrote to memory of 2944 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2944 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2944 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2944 1192 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\f875ce20d9473d5dd74d2e0382fb32ba.js2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zIMOUAQYhg.js"3⤵
- Drops startup file
- Adds Run key to start application
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD563f3a93c472be113725e951e40696642
SHA115477f7333a4ad56227bc61049c5eb5451ac73c7
SHA25692e653a855a5495cc862ed79ee39aa6620b9b0b08948e89f866b07debba1b2f8
SHA512c155c01b90f80ab7125138e79a03a07b3699a00d1953653a00ac2f29d06d496bc9633119f3885f36f615313630cd1283822b12f38d7446a698b430584e238549
-
Filesize
9KB
MD5797f97b46b0f42d7a26810b7b2e04cc9
SHA1141b0a609e3fe9e4695ad0dfd905be24414287ab
SHA2562a15292e70c7b6edbfb44ae1347debf9ab31bb3296b7cd3619fda0f9abf0d89d
SHA512c5173a980edc2230d9673e2c5729b6829c4130e80a14eb7efd7f0e41bc5a3f01b559fb67b5be191e0a309f0b04abf2c52b632e873307471569a07f995774a27d