Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:41

General

  • Target

    163a61f30478a21a6e91765d09fdbb51.exe

  • Size

    807KB

  • MD5

    163a61f30478a21a6e91765d09fdbb51

  • SHA1

    7baf2e6911e114946ebb7e6475cb7b74ab6af343

  • SHA256

    be230035f1e1b86c687d94ba142e56f1859cbee72cce927a62047e04b30b7807

  • SHA512

    17e63aeeb25be473e1b6c80d84e9a94d1f249900c3406fabe71971c24d500d7855d8fc36f855ec52c4b96b37d40f3bf11c312308a54c84c7afab0c5369bf3e45

  • SSDEEP

    12288:ixx3htjxnAqZ6oR65AXwgFvuSSSII920CdUjRQg75zsDxrK4EFA1lN3mgR3mEuK:ixx32oR6qge920CdUjvSpK/KXNV3mI

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

u3r5

Decoy

alashan.ltd

demopagephequan.online

garxznql.icu

unetart.com

dajiangzhibo15.com

influencer.fund

beverlyhills.city

strefafryzur.net

giftboxhawaii.com

ecotiare.com

homeandgardenradioshow.com

sageandsandco.com

laflesoley.com

icipatanegra.online

autovistoriapredial.net

xn--polenezkypark-pmb.com

cbdamic.com

aaronandmarissa.com

datasoma.digital

theclosetology.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\163a61f30478a21a6e91765d09fdbb51.exe
    "C:\Users\Admin\AppData\Local\Temp\163a61f30478a21a6e91765d09fdbb51.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\163a61f30478a21a6e91765d09fdbb51.exe
      "C:\Users\Admin\AppData\Local\Temp\163a61f30478a21a6e91765d09fdbb51.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2380
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\163a61f30478a21a6e91765d09fdbb51.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2380-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2380-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2380-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2380-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2380-16-0x0000000000940000-0x0000000000C43000-memory.dmp

    Filesize

    3.0MB

  • memory/2924-20-0x0000000002C60000-0x0000000002CA0000-memory.dmp

    Filesize

    256KB

  • memory/2924-24-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-19-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-21-0x0000000074E20000-0x00000000753CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-22-0x0000000002C60000-0x0000000002CA0000-memory.dmp

    Filesize

    256KB

  • memory/2924-23-0x0000000002C60000-0x0000000002CA0000-memory.dmp

    Filesize

    256KB

  • memory/2928-5-0x0000000004DF0000-0x0000000004E30000-memory.dmp

    Filesize

    256KB

  • memory/2928-15-0x0000000074E60000-0x000000007554E000-memory.dmp

    Filesize

    6.9MB

  • memory/2928-7-0x0000000000630000-0x000000000065E000-memory.dmp

    Filesize

    184KB

  • memory/2928-6-0x0000000005C60000-0x0000000005CFE000-memory.dmp

    Filesize

    632KB

  • memory/2928-0-0x00000000001C0000-0x0000000000290000-memory.dmp

    Filesize

    832KB

  • memory/2928-4-0x0000000074E60000-0x000000007554E000-memory.dmp

    Filesize

    6.9MB

  • memory/2928-3-0x0000000000370000-0x000000000038A000-memory.dmp

    Filesize

    104KB

  • memory/2928-2-0x0000000004DF0000-0x0000000004E30000-memory.dmp

    Filesize

    256KB

  • memory/2928-1-0x0000000074E60000-0x000000007554E000-memory.dmp

    Filesize

    6.9MB