Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
4790a6bec0eb9efda12d2abe2bb38d00.exe
Resource
win7-20231215-en
General
-
Target
4790a6bec0eb9efda12d2abe2bb38d00.exe
-
Size
1.3MB
-
MD5
4790a6bec0eb9efda12d2abe2bb38d00
-
SHA1
fee62df00e5888398be1cf7d8abc716afe43d37d
-
SHA256
8b46ffe6f10e29d52a311f2516deb4f54b84ddedf75a3a6921e1423518658e26
-
SHA512
751bc4ca9266183b1e4ca855cac6734b3148a51db845c33d664f6ce49c19091f2b703c756d5b51be6ba98e5774d462b9313ab3e20f1d4efc518260b8bbcc0840
-
SSDEEP
24576:0EUzRj83ukaDcTG7dDkuepQUsjtbbn2YgVuZlZcjOsZ3ON:y83uka7kuOQVRr2RvrO
Malware Config
Extracted
xloader
2.3
n84e
upscalebuyer.com
qtict.net
karlgillard.com
fangsbags.com
blackwhitebangtan.com
lojaautomatica.com
browbabelondon.com
dupladocabelo.com
tcheap3dwdshop.com
htnmg.com
globaltradeview.com
instrumentwinebreathe.net
futurejobstech.com
notemanches.com
myconventionalcooking.xyz
doniang.com
ouruiwh.com
tecnologiatimes.com
yxbmfc.com
mae-baby.com
alsiha2020.com
zenqueue.com
myomlineservicing.com
justin-appel.com
protectallfarms.com
fairwaysxm.com
msec-santander.com
previem.com
legifo.com
reitzforrep.com
oanicoin.com
scorchonerecords.com
hheiy35.com
aurorabradfordoptometrists.com
kailinsen.com
ownerspreinspect.com
instantfames.com
wdi.technology
compareionizers.com
habbuhot.info
thinking-diversity.com
swagmansbreakfast.com
thepegasusclub.com
crazyhorseoutfitters.com
flvrpodcast.com
mz66a.com
vineyardtrailrides.com
khazana-bazaar.com
m-corgroup.com
kidsnbuds.com
whatsprosender.com
lundagers.com
betterhealthdc.com
mehtalawgroup.com
contex33.xyz
fastloanflorida.net
lautaigia.net
792argonne.com
xtravigant.com
anbotechsolution.com
minipockethouse.com
ehubo3y.com
greaterdenver.online
batracomputer.com
conectaragora.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4696-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5000 set thread context of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4696 4790a6bec0eb9efda12d2abe2bb38d00.exe 4696 4790a6bec0eb9efda12d2abe2bb38d00.exe 4696 4790a6bec0eb9efda12d2abe2bb38d00.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102 PID 5000 wrote to memory of 4696 5000 4790a6bec0eb9efda12d2abe2bb38d00.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-