Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.exe
Resource
win7-20240708-en
General
-
Target
Payment Slip.exe
-
Size
223KB
-
MD5
5cdcec900819b181a01ea4c007995969
-
SHA1
d71954224a3c986ac4a7f116d4067d98257cfbb5
-
SHA256
7fd75617ee39e8ed51f7e118f0aa46b83916dbf0d1d769e088c3fca7a4c0014f
-
SHA512
e741d7658397cb8f8c581bd3d2c3807b93f9e987ff10668e5d7cea6dee149553392ee32be3983cc4adc9340cfe9ff3915a91faec9ad4a74574c0299d6c4761ad
-
SSDEEP
3072:1g10r0K/C7MAov2zdV2JE/0unArFJHJlrAlfidgVkmv058mZT6+upQkdO7:1q0rpsMA+krMBBJHJZdnrb6+uQ
Malware Config
Extracted
xloader
2.3
ieqo
new-post-25782.xyz
podcastrrr.com
babyspageelong.com
boaddeo.club
distribuzionemedica.com
peaceofminderbinder.com
abbyrosemusic.com
odessawildliferemoval.com
prosperasight.com
liibbyapp.com
shandaferguson.com
kirsehiryenihaber.com
secured07b-chase.com
leanonmelifeadvice.com
securemtgs.com
temgk255.space
lunasparallevar.com
transportesdario.com
redwork.club
directopolis.com
sorevcbns.com
bibliothecadigital.com
theagileconfessional.com
lebottindesentreprises.com
dvd-org.com
1ajycapital.com
nailquan2.com
javacoffeebeans.com
sizish.com
susannhaehnel.net
gouaya.com
marvelstrikeclub.com
catwalkangels.com
runlywood-nambda.icu
hongfengjmzz.com
reviveyourride-detailing.com
x93snefkb9.com
irsettlement.com
injurylawyersnm.com
zhcc.ltd
homerivercommercial.com
drkitange.com
atauysal.com
sleekedup.net
ez-insurance-quotes.com
lumber-pt.com
citi-star.taxi
chimaratransport.com
absbropaul.com
jewelsbybri.com
racevc.com
buyer-centric.com
viableprocedure.com
paarlstudio.com
thinbluelinepatriots.com
crowtzequipped.com
missioncareasia.com
tesrvstorage.com
xn--zfrz5x6lhwxt66f.tech
mansmoon.com
werkstrand.cloud
amoscontent.com
exainc.net
cigartent.com
rukreditpay.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1660-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1660-6-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1660-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3624-16-0x0000000000FD0000-0x0000000000FF9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1140 set thread context of 1660 1140 Payment Slip.exe 82 PID 1660 set thread context of 3424 1660 Payment Slip.exe 55 PID 1660 set thread context of 3424 1660 Payment Slip.exe 55 PID 3624 set thread context of 3424 3624 NETSTAT.EXE 55 -
Program crash 1 IoCs
pid pid_target Process procid_target 1056 1140 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Slip.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3624 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE 3624 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1140 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 1660 Payment Slip.exe 3624 NETSTAT.EXE 3624 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1660 Payment Slip.exe Token: SeShutdownPrivilege 3424 Explorer.EXE Token: SeCreatePagefilePrivilege 3424 Explorer.EXE Token: SeDebugPrivilege 3624 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1660 1140 Payment Slip.exe 82 PID 1140 wrote to memory of 1660 1140 Payment Slip.exe 82 PID 1140 wrote to memory of 1660 1140 Payment Slip.exe 82 PID 1140 wrote to memory of 1660 1140 Payment Slip.exe 82 PID 3424 wrote to memory of 3624 3424 Explorer.EXE 86 PID 3424 wrote to memory of 3624 3424 Explorer.EXE 86 PID 3424 wrote to memory of 3624 3424 Explorer.EXE 86 PID 3624 wrote to memory of 4692 3624 NETSTAT.EXE 87 PID 3624 wrote to memory of 4692 3624 NETSTAT.EXE 87 PID 3624 wrote to memory of 4692 3624 NETSTAT.EXE 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 4643⤵
- Program crash
PID:1056
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1140 -ip 11401⤵PID:4012