Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
P.O-48452689535945.exe
Resource
win7-20240704-en
General
-
Target
P.O-48452689535945.exe
-
Size
521KB
-
MD5
579c372392d600a9ef621ae4c1f7341a
-
SHA1
e4fb160d99727aa5ffee784c9a5f52f6581704ee
-
SHA256
f564f410274ccf48d4513984d1da95edefa874a555f5e7d95fae7f9cc1f46b6b
-
SHA512
1c744f5d9b4bb04e0ed84bc66ad6a4970e2ff18da28a4c2b9910683821c6fe43ad585e22c56fbb26e1c0db547c7e58d432ffb9c1186da81b47c7f13e7335755f
-
SSDEEP
6144:0uq2lrmbYS9j7tCiyEKAm63z9EZgVY+RQbwesfqFi/mpZ5bjf9VAZUUryjzbi:0WCbYQjoiuM3J0CyFzxVAZnreXi
Malware Config
Extracted
xloader
2.3
h3qo
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
elevatedenterprizes.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral1/memory/1656-2-0x0000000004120000-0x000000000417E000-memory.dmp beds_protector -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1632-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1632-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2884-19-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1656 set thread context of 1632 1656 P.O-48452689535945.exe 29 PID 1632 set thread context of 1344 1632 P.O-48452689535945.exe 20 PID 2884 set thread context of 1344 2884 help.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P.O-48452689535945.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1632 P.O-48452689535945.exe 1632 P.O-48452689535945.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe 2884 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1632 P.O-48452689535945.exe 1632 P.O-48452689535945.exe 1632 P.O-48452689535945.exe 2884 help.exe 2884 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1632 P.O-48452689535945.exe Token: SeDebugPrivilege 2884 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1656 wrote to memory of 1632 1656 P.O-48452689535945.exe 29 PID 1344 wrote to memory of 2884 1344 Explorer.EXE 30 PID 1344 wrote to memory of 2884 1344 Explorer.EXE 30 PID 1344 wrote to memory of 2884 1344 Explorer.EXE 30 PID 1344 wrote to memory of 2884 1344 Explorer.EXE 30 PID 2884 wrote to memory of 2760 2884 help.exe 31 PID 2884 wrote to memory of 2760 2884 help.exe 31 PID 2884 wrote to memory of 2760 2884 help.exe 31 PID 2884 wrote to memory of 2760 2884 help.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-