Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
QFL21070864140HQ-pdf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
QFL21070864140HQ-pdf.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
SO06598270-PI#JARA03-pdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SO06598270-PI#JARA03-pdf.exe
Resource
win10v2004-20231215-en
General
-
Target
QFL21070864140HQ-pdf.exe
-
Size
1.0MB
-
MD5
dc1d2738ba06e1287d61bab41bdb587f
-
SHA1
29220b1a6efc6eee9e6691fe09c8ab001ecb07c4
-
SHA256
8d14d34bfe71397c4afe1a39bd68139f0d044f21e4cf5eaa43fc8fc15cb74d82
-
SHA512
2f056a5ea3adcbf35cca58c820e806718498aadec7bd552c138bb9f4076bc9a959e8412f9a9c5298bff1b9969b675142c52f6f0b4f11c13e6c40e79c8a2d163e
-
SSDEEP
24576:MAfuE/aqagftlM1vj9L5O5Fx85/drK64JCG4RoyCcbO82QsFKw2L9:MAfuE/aqagftlM1vj7OgK64JxqkcbeK9
Malware Config
Extracted
xloader
2.3
ipa8
royalposhpups.com
univa.world
lanerbo.com
shopbabygo.com
theutahhomestore.com
serialmixer.icu
linfeiya.com
xn--12cg3de5c2eb5cyi.com
am-conseil-communication.com
dailygame168.com
therightmilitia.com
visions-agency.com
mapopi.com
frugallyketo.com
guapandglo.com
54w-x126v.net
your-health-kick.com
blockchainhub360.com
registernowhd.xyz
votekellykitashima.com
astyaviewer.com
kinnonstudio.com
calerie.coffee
oqity.com
ia3v0m.com
maryland-real-estates.com
rwaafd.com
mnavn.com
valhallamedics.com
realbetisbalompie.xyz
askaboutaduhelm.com
sazekav.com
jxhg163.com
littlescampers.com
northwayenterprise.com
miotir.com
pastelpastrybakery.com
thebandaiderepair.com
plastings.com
hubrisnewyork.com
mervperu.com
calvarirumba.com
evidencemetrics.com
privedenim.com
thebreedersbuddy.info
poolsnation.com
lessonex.com
bainrix.com
celiktarim.com
ortodonciaberistain.com
curtisbigelow.net
golfwifi.net
instrumentum.store
legacymediaentertainment.com
okwideus.com
rixmusic.com
best123-movies.com
edwardsrealtyfl.rentals
beaumontcycleworks.com
abolad.com
hydrarobuxobby.com
addisonbleu.com
xiang-life.net
tailored2fit.online
desarrollosolucionesnavarro.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1004-8-0x0000000005180000-0x0000000005192000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4368-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4368-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3888-23-0x0000000000A00000-0x0000000000A29000-memory.dmp xloader behavioral2/memory/3888-25-0x0000000000A00000-0x0000000000A29000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1004 set thread context of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 4368 set thread context of 3416 4368 QFL21070864140HQ-pdf.exe 60 PID 3888 set thread context of 3416 3888 msdt.exe 60 -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe 3888 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 4368 QFL21070864140HQ-pdf.exe 3888 msdt.exe 3888 msdt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4368 QFL21070864140HQ-pdf.exe Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeDebugPrivilege 3888 msdt.exe Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3416 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 1004 wrote to memory of 4368 1004 QFL21070864140HQ-pdf.exe 100 PID 3416 wrote to memory of 3888 3416 Explorer.EXE 101 PID 3416 wrote to memory of 3888 3416 Explorer.EXE 101 PID 3416 wrote to memory of 3888 3416 Explorer.EXE 101 PID 3888 wrote to memory of 3712 3888 msdt.exe 102 PID 3888 wrote to memory of 3712 3888 msdt.exe 102 PID 3888 wrote to memory of 3712 3888 msdt.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QFL21070864140HQ-pdf.exe"3⤵PID:3712
-
-