Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
QFL21070864140HQ-pdf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
QFL21070864140HQ-pdf.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
SO06598270-PI#JARA03-pdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SO06598270-PI#JARA03-pdf.exe
Resource
win10v2004-20231215-en
General
-
Target
QFL21070864140HQ-pdf.exe
-
Size
1.0MB
-
MD5
dc1d2738ba06e1287d61bab41bdb587f
-
SHA1
29220b1a6efc6eee9e6691fe09c8ab001ecb07c4
-
SHA256
8d14d34bfe71397c4afe1a39bd68139f0d044f21e4cf5eaa43fc8fc15cb74d82
-
SHA512
2f056a5ea3adcbf35cca58c820e806718498aadec7bd552c138bb9f4076bc9a959e8412f9a9c5298bff1b9969b675142c52f6f0b4f11c13e6c40e79c8a2d163e
-
SSDEEP
24576:MAfuE/aqagftlM1vj9L5O5Fx85/drK64JCG4RoyCcbO82QsFKw2L9:MAfuE/aqagftlM1vj7OgK64JxqkcbeK9
Malware Config
Extracted
xloader
2.3
ipa8
royalposhpups.com
univa.world
lanerbo.com
shopbabygo.com
theutahhomestore.com
serialmixer.icu
linfeiya.com
xn--12cg3de5c2eb5cyi.com
am-conseil-communication.com
dailygame168.com
therightmilitia.com
visions-agency.com
mapopi.com
frugallyketo.com
guapandglo.com
54w-x126v.net
your-health-kick.com
blockchainhub360.com
registernowhd.xyz
votekellykitashima.com
astyaviewer.com
kinnonstudio.com
calerie.coffee
oqity.com
ia3v0m.com
maryland-real-estates.com
rwaafd.com
mnavn.com
valhallamedics.com
realbetisbalompie.xyz
askaboutaduhelm.com
sazekav.com
jxhg163.com
littlescampers.com
northwayenterprise.com
miotir.com
pastelpastrybakery.com
thebandaiderepair.com
plastings.com
hubrisnewyork.com
mervperu.com
calvarirumba.com
evidencemetrics.com
privedenim.com
thebreedersbuddy.info
poolsnation.com
lessonex.com
bainrix.com
celiktarim.com
ortodonciaberistain.com
curtisbigelow.net
golfwifi.net
instrumentum.store
legacymediaentertainment.com
okwideus.com
rixmusic.com
best123-movies.com
edwardsrealtyfl.rentals
beaumontcycleworks.com
abolad.com
hydrarobuxobby.com
addisonbleu.com
xiang-life.net
tailored2fit.online
desarrollosolucionesnavarro.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2908-3-0x0000000000250000-0x0000000000262000-memory.dmp CustAttr -
Xloader payload 5 IoCs
resource yara_rule behavioral1/memory/2744-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2744-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2744-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2484-27-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral1/memory/2484-29-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2908 set thread context of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2744 set thread context of 1368 2744 QFL21070864140HQ-pdf.exe 7 PID 2744 set thread context of 1368 2744 QFL21070864140HQ-pdf.exe 7 PID 2484 set thread context of 1368 2484 cmmon32.exe 7 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2744 QFL21070864140HQ-pdf.exe 2744 QFL21070864140HQ-pdf.exe 2744 QFL21070864140HQ-pdf.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe 2484 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2744 QFL21070864140HQ-pdf.exe 2744 QFL21070864140HQ-pdf.exe 2744 QFL21070864140HQ-pdf.exe 2744 QFL21070864140HQ-pdf.exe 2484 cmmon32.exe 2484 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 QFL21070864140HQ-pdf.exe Token: SeDebugPrivilege 2484 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 2908 wrote to memory of 2744 2908 QFL21070864140HQ-pdf.exe 28 PID 1368 wrote to memory of 2484 1368 Explorer.EXE 29 PID 1368 wrote to memory of 2484 1368 Explorer.EXE 29 PID 1368 wrote to memory of 2484 1368 Explorer.EXE 29 PID 1368 wrote to memory of 2484 1368 Explorer.EXE 29 PID 2484 wrote to memory of 2944 2484 cmmon32.exe 33 PID 2484 wrote to memory of 2944 2484 cmmon32.exe 33 PID 2484 wrote to memory of 2944 2484 cmmon32.exe 33 PID 2484 wrote to memory of 2944 2484 cmmon32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"3⤵
- Deletes itself
PID:2944
-
-