Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
277b8bac14e09015d53ad66c97e272a0.exe
Resource
win7-20231129-en
General
-
Target
277b8bac14e09015d53ad66c97e272a0.exe
-
Size
1.3MB
-
MD5
277b8bac14e09015d53ad66c97e272a0
-
SHA1
ef1bd1e7dcd9633244c3e9bcaeef190ff8eab47d
-
SHA256
45fad79d5665cbad096d1029eb228bdca999352958c393d08e2813787fc2dcb0
-
SHA512
933f0dbc416e0d409aca40569b8b819690623e342de14aa8a1a51b1714018409bd7a818b334573dc7b1d9a36d4f365264d70bd6ddb16a4692a5c0d145209d708
-
SSDEEP
12288:SCpc6JmEOMCQryZ/3Mc64rc2JH9EY9n7MKScl8qRi7ggQDmH7PQ6H+Uy1Susr8Mk:LJ0MCiyHfc2bEYt7x83EOMZZS5R0
Malware Config
Extracted
xloader
2.3
udew
danieleawilliams.com
miladjalilian.com
hzmila.com
elecreator.com
instrep.com
4tongzhi.com
sltreeserv.com
expressrev.com
dataresearchcenter.com
filmblingalley.com
3buagency.com
hxjh888.com
gotmetwistedcomb.com
vihco.com
scg.solutions
drcvkm.com
frostresorts.com
gintech.co.uk
luxury-holding.com
roupasdobras.com
renewsamericas.com
bigjohnseatery.com
cenasymerienda.site
gumrukihaleleri.com
copyfolio.info
taoke666.net
xiamora.com
turnobyte.com
levoeushop.com
adburb.com
oneonecity.xyz
crmcheap.com
beiligao.com
digitalschool-ug.com
livinginroanoke.info
yourhiddenpurpose.com
aictin.com
bebelocare.com
onlyglaziers.com
mavericknm20.com
curve-designs.com
customshirtnearme.com
kallifoods.com
njrongjia.com
tacardia.email
tscysh.com
febrayer24.com
cuties4you.net
tripsandtritips.com
joshchez.com
bulukx.com
forgeofadyingstar.com
biggerscoops.com
rapidcovidscreening.com
greensborotreepros.com
iroogmak.com
houtb.info
afaccess.xyz
speakingsuite.com
onyxdigisol.com
sto-emega.com
rtmecha.info
christiandivainc.com
primebecas.com
agendno.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2756-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2944 set thread context of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 277b8bac14e09015d53ad66c97e272a0.exe 2756 277b8bac14e09015d53ad66c97e272a0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 277b8bac14e09015d53ad66c97e272a0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2596 2944 277b8bac14e09015d53ad66c97e272a0.exe 29 PID 2944 wrote to memory of 2596 2944 277b8bac14e09015d53ad66c97e272a0.exe 29 PID 2944 wrote to memory of 2596 2944 277b8bac14e09015d53ad66c97e272a0.exe 29 PID 2944 wrote to memory of 2596 2944 277b8bac14e09015d53ad66c97e272a0.exe 29 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28 PID 2944 wrote to memory of 2756 2944 277b8bac14e09015d53ad66c97e272a0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"2⤵PID:2596
-