Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
gynoox.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
gynoox.exe
Resource
win10v2004-20240709-en
General
-
Target
e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe
-
Size
214KB
-
MD5
3e63f636a493ee210b6627e63c954665
-
SHA1
07edabeb3c3375043de5a0a2af222a9888e40c75
-
SHA256
e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce
-
SHA512
4bea9a7c13ff9543532bbbb5ef1497bf3d31d03d1629365d962e953695ebc4d77dde329b451e1b07cdf18c3883d22df2e58b2602e116e32bc4292e027b2c0a42
-
SSDEEP
6144:oNeZg14JHXuf5KmE+rZOuTdcC2xIC90pLXg4Psgf:oN8HXG1NOiSPxbCLX7PsO
Malware Config
Extracted
xloader
2.5
hsot
carefile.icu
autrement-dit-translation.com
openft.xyz
hip-express.com
snowwisdom.com
effort-less.xyz
cardiopulmonaryservices.com
mednotics.com
hxtz54.com
sendex.global
getemergencyfood.com
xn--ekr703aymjgvi.group
whitmanrandolphmath.com
theunitedgamingleague.net
sxqnx.com
finessemovement.com
srsremodelinginc.com
shuddhiorganics.com
tlichomedical.com
millennium.school
medienexpert.com
shawnahearnarts.com
brandianext.com
earthezy.com
foldablehandset.com
buggy4t.com
yavuzselimorganizasyon.com
ky1v.com
physicsonscreen.com
9job8.com
myadventures.online
goalcations.com
bamshre.club
senangdominos.com
lookatcrash.online
luxberryco.com
azvirtualstaff.com
copytradepremium.com
cafebar-may.com
rghuba.com
workkiyu.com
yogaforall1.website
vamp4883.com
ametinteriors.com
churchvilledental.com
bj-htjy360.com
eightwebbuilder.com
missuniversepr.com
hoppehour.com
colesfax.com
str8ey.com
wdz888995.com
bellezanaturalcyc.com
pkathletics.com
clintoncohealth.com
ord12route.art
clutterfix.biz
redroofinnmilwaukee.com
miamifastcashhomebuyers.com
career-atoz.com
fpinc.net
mistermissyco.com
pubtech-marketing.com
4m5k.com
skyrim.company
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2464-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2464-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2464-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2780-26-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 1732 gynoox.exe 2464 gynoox.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe 1732 gynoox.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1732 set thread context of 2464 1732 gynoox.exe 32 PID 2464 set thread context of 1200 2464 gynoox.exe 21 PID 2464 set thread context of 1200 2464 gynoox.exe 21 PID 2780 set thread context of 1200 2780 mstsc.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gynoox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gynoox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2464 gynoox.exe 2464 gynoox.exe 2464 gynoox.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe 2780 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2464 gynoox.exe 2464 gynoox.exe 2464 gynoox.exe 2464 gynoox.exe 2780 mstsc.exe 2780 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2464 gynoox.exe Token: SeDebugPrivilege 2780 mstsc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1732 2036 e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe 31 PID 2036 wrote to memory of 1732 2036 e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe 31 PID 2036 wrote to memory of 1732 2036 e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe 31 PID 2036 wrote to memory of 1732 2036 e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe 31 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 1732 wrote to memory of 2464 1732 gynoox.exe 32 PID 2464 wrote to memory of 2780 2464 gynoox.exe 33 PID 2464 wrote to memory of 2780 2464 gynoox.exe 33 PID 2464 wrote to memory of 2780 2464 gynoox.exe 33 PID 2464 wrote to memory of 2780 2464 gynoox.exe 33 PID 2780 wrote to memory of 2880 2780 mstsc.exe 34 PID 2780 wrote to memory of 2880 2780 mstsc.exe 34 PID 2780 wrote to memory of 2880 2780 mstsc.exe 34 PID 2780 wrote to memory of 2880 2780 mstsc.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe"C:\Users\Admin\AppData\Local\Temp\e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\gynoox.exeC:\Users\Admin\AppData\Local\Temp\gynoox.exe C:\Users\Admin\AppData\Local\Temp\jbvzhvisee3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\gynoox.exeC:\Users\Admin\AppData\Local\Temp\gynoox.exe C:\Users\Admin\AppData\Local\Temp\jbvzhvisee4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\gynoox.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD514eb81fc11bc5a7519e1d13d9c8db270
SHA1e7fb259e2d54e8d489c31394f4972f8c983a10f6
SHA256fc71e6c40f10c1e7168aafbc20e02af04e4d6e20c5eeed30d337e22f7f3eb4e5
SHA51235c2ae89f4927d3c5e78c05f28203c00ba6ba5de10b0f11ab1573114c5170921ea6412a90b2992b2a5efafb59757c9b0810b3bda86293e9fe5b02e03f225a08a
-
Filesize
163KB
MD5608f25eda319b6b7ff254ae53a9e8705
SHA122fb3e020a4d186fd6e66604754e42c94e546e44
SHA256828363931d3b8d883bc873ca92fdfe5c84937f030c1907868d7e8cecd2ca08e4
SHA512fac692824d87c2017ec1a4a2f5a642a0f89403c174933e1c7077e0e1098ea3f63a5ecf5ac7107e5c6d440c120b40c01bb2bc812d1c3d50dafe3229b9e66cb1eb
-
Filesize
3KB
MD5c81d16f671e6bdf7f5ae1c7003856717
SHA1031ae8483b93c7040fb327d1141dfafa636b75bb
SHA256ea757de6b7cb2593fbdac083b42f2143812370c864e30c8c461de152664e9a1f
SHA512f08e25b1f3ba7e58b4f4993b4cf4079e45c132dc85f6f323eba83c4a92d61e76c74a0b264802aabc031f08f13d291d1c6556bd8d7747ba5f37b306346bc732f8