Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
277b8bac14e09015d53ad66c97e272a0.exe
Resource
win7-20231129-en
General
-
Target
277b8bac14e09015d53ad66c97e272a0.exe
-
Size
1.3MB
-
MD5
277b8bac14e09015d53ad66c97e272a0
-
SHA1
ef1bd1e7dcd9633244c3e9bcaeef190ff8eab47d
-
SHA256
45fad79d5665cbad096d1029eb228bdca999352958c393d08e2813787fc2dcb0
-
SHA512
933f0dbc416e0d409aca40569b8b819690623e342de14aa8a1a51b1714018409bd7a818b334573dc7b1d9a36d4f365264d70bd6ddb16a4692a5c0d145209d708
-
SSDEEP
12288:SCpc6JmEOMCQryZ/3Mc64rc2JH9EY9n7MKScl8qRi7ggQDmH7PQ6H+Uy1Susr8Mk:LJ0MCiyHfc2bEYt7x83EOMZZS5R0
Malware Config
Extracted
xloader
2.3
udew
danieleawilliams.com
miladjalilian.com
hzmila.com
elecreator.com
instrep.com
4tongzhi.com
sltreeserv.com
expressrev.com
dataresearchcenter.com
filmblingalley.com
3buagency.com
hxjh888.com
gotmetwistedcomb.com
vihco.com
scg.solutions
drcvkm.com
frostresorts.com
gintech.co.uk
luxury-holding.com
roupasdobras.com
renewsamericas.com
bigjohnseatery.com
cenasymerienda.site
gumrukihaleleri.com
copyfolio.info
taoke666.net
xiamora.com
turnobyte.com
levoeushop.com
adburb.com
oneonecity.xyz
crmcheap.com
beiligao.com
digitalschool-ug.com
livinginroanoke.info
yourhiddenpurpose.com
aictin.com
bebelocare.com
onlyglaziers.com
mavericknm20.com
curve-designs.com
customshirtnearme.com
kallifoods.com
njrongjia.com
tacardia.email
tscysh.com
febrayer24.com
cuties4you.net
tripsandtritips.com
joshchez.com
bulukx.com
forgeofadyingstar.com
biggerscoops.com
rapidcovidscreening.com
greensborotreepros.com
iroogmak.com
houtb.info
afaccess.xyz
speakingsuite.com
onyxdigisol.com
sto-emega.com
rtmecha.info
christiandivainc.com
primebecas.com
agendno.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4456-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3676 set thread context of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4456 277b8bac14e09015d53ad66c97e272a0.exe 4456 277b8bac14e09015d53ad66c97e272a0.exe 4456 277b8bac14e09015d53ad66c97e272a0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102 PID 3676 wrote to memory of 4456 3676 277b8bac14e09015d53ad66c97e272a0.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"C:\Users\Admin\AppData\Local\Temp\277b8bac14e09015d53ad66c97e272a0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-