Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20241010-en
General
-
Target
Quotation.exe
-
Size
1.1MB
-
MD5
5caf99a5eb3975b435161de0b401b1b5
-
SHA1
271249f641ecbcd5f17b21cd8500b78acb05b5d1
-
SHA256
574d7449e38aa78b8c46331df27b3c429feb34e16e2ae36fdf9516af6c793754
-
SHA512
b7dc01123ad31dbaafbc9aa62eb600356c70dcf71240ad1503e95ada96e198bfddebae68d280d498d15d7fab0cf26f182662a60d1216db9cc4a39adccd8bd754
-
SSDEEP
24576:hfjT+bAaMd3REebAaMd3f0xDccnNiydYfwxbmv87AT16:J+AaMVRE2AaMVMxOyFKsAZ
Malware Config
Extracted
xloader
2.3
pz9b
gochili.info
cyberdatadefence.com
payonbux.com
candiceswanepoelbrasil.com
mykaoa.com
tanabe-kanagu.com
dovetailgoodlife.xyz
alabasterautomotive.com
tajc.club
authwdqtsi6sojynof9gmazon.com
cookingguides.net
yah360.com
berriq.com
freetoreview.online
yachtsgoneonline.com
clothestokidsri.com
howtogetstartedwithfba.com
simplepartyplanning.com
sunrisekai.com
wealthfarmer.net
indumaqservicios.com
sanookna.com
stgg.net
resultrun.info
dynamismedical.com
katfacecosmetics.com
wjlzbc.com
madebymygypsysoul.com
belpair.net
aktamusic.com
generationathletic.fitness
artandscience.info
timbisoaps.com
foursonsltd.com
komitmenindonesiasejahtera.com
buildingbusinessonline.net
nativeiso.com
sagalocal.icu
deepcombine.com
conecationsystemss.net
airtech-engineers.com
rjccollectibles.com
haegrumfood.com
brunchtimes.com
beautifulbodyz.com
vidaifriend.com
blinbins.com
cvnsm2020.com
thompsonwebmanagement.com
xn--lichthlzer-jcb.com
tyrellsaintvil.com
charismaadvice.com
webshopfront.com
creativesoulsclubs.com
schul-service.com
maridaniellecontreras.com
thefreelancerzone.com
1000-help4.club
thecookiechicktx.com
mutschein.com
balveny.com
sorteesportiva.bet
adamsandfane.com
ashleyjordanoutlaws.com
generalplex.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2716-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2716-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2592-22-0x0000000000070000-0x0000000000098000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1660 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2660 set thread context of 2716 2660 Quotation.exe 29 PID 2716 set thread context of 1360 2716 Quotation.exe 20 PID 2592 set thread context of 1360 2592 wscript.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2716 Quotation.exe 2716 Quotation.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe 2592 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2716 Quotation.exe 2716 Quotation.exe 2716 Quotation.exe 2592 wscript.exe 2592 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2716 Quotation.exe Token: SeDebugPrivilege 2592 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 2660 wrote to memory of 2716 2660 Quotation.exe 29 PID 1360 wrote to memory of 2592 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2592 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2592 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2592 1360 Explorer.EXE 30 PID 2592 wrote to memory of 1660 2592 wscript.exe 31 PID 2592 wrote to memory of 1660 2592 wscript.exe 31 PID 2592 wrote to memory of 1660 2592 wscript.exe 31 PID 2592 wrote to memory of 1660 2592 wscript.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1660
-
-