Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/nbjkg.dll
-
Size
38KB
-
MD5
ff488c7d8f8f03c34e67a7ac3ebeaafe
-
SHA1
bbc4aacac09047d12f6ea5b54a24255e9389ba0e
-
SHA256
b6f7a133237e590893ca7e6aceb76d96c8bfff8c767dcd4db53a57b366366dfa
-
SHA512
9955013d4f601507ab35453a5b38063cadd2f75946ed998169d7fc42fe133deed31a0927693c8f131161df5281e0a2499b2b37359f7662b3e948c2cf407e11f1
-
SSDEEP
768:iNQs0OCYx0PV+EtiuxNs7sTHrHAm/N49v2PtyCjQphC/5BlfB4We8wCX04e7Z8Ym:5hOCggNsudB4We8w54e7Zhb6
Malware Config
Extracted
xloader
2.5
dhua
ketostar.club
icanmakeyoufamous.com
claimygdejection.com
garlicinterestedparent.xyz
bits-clicks.com
030atk.xyz
ballwiegand.com
logs-illumidesk.com
785686.com
flnewsfeed.com
transporteshrj.net
agenciamundodigital.online
bowersllc.com
urchncenw.com
wuauwuaumx.com
littlesportsacademy.com
xn--m3chb3ax0abdta3fwhk.com
prmarketings.com
jiaozhanlianmeng.com
whenisthestore.space
ventureagora.net
ditrixmed.store
gitlab-tamskillpage.com
samgravikasnidhi.com
lenti4you.com
reviewallstarscommerce.com
nissimarble.com
md2px.xyz
tristarelectronics.net
you11.net
vaccinationfraud.xyz
bu3helo.com
marcellcheckpoint.com
hassinkandroos.com
socw.quest
screenedscooptoknow-today.info
aciburada.com
edimacare.com
smokenation.net
elga-groupinc.com
26dgj.xyz
chandleenews.com
sugarcanemultisport.com
nichellejonesrealtor.com
architektschnur.com
atehgroup.com
ocoeeboys.com
zanesells.com
878971.com
infringement-notice.com
orzame.com
darlindough.com
bwpassionenterprise.com
switchress.com
willcowblog.online
rsyncpalace.com
ayderstudio.com
ascotintrenational.com
omeducationhelp.com
kimberleydawnwallace.com
thereisnooneway.com
marketobserve.com
sildenafilnrx.com
willowbaldwin.com
segurosramosroman.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2720-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2720-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2920-16-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3064 set thread context of 2720 3064 rundll32.exe 31 PID 2720 set thread context of 1212 2720 rundll32.exe 21 PID 2920 set thread context of 1212 2920 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe 2920 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2920 chkdsk.exe 2920 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 rundll32.exe Token: SeDebugPrivilege 2920 chkdsk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 2120 wrote to memory of 3064 2120 rundll32.exe 30 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 3064 wrote to memory of 2720 3064 rundll32.exe 31 PID 1212 wrote to memory of 2920 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2920 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2920 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2920 1212 Explorer.EXE 32 PID 2920 wrote to memory of 2156 2920 chkdsk.exe 33 PID 2920 wrote to memory of 2156 2920 chkdsk.exe 33 PID 2920 wrote to memory of 2156 2920 chkdsk.exe 33 PID 2920 wrote to memory of 2156 2920 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbjkg.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-