Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
DOC09178236_20210922.exe
Resource
win7-20240903-en
General
-
Target
DOC09178236_20210922.exe
-
Size
734KB
-
MD5
38cb740b60d846d2a14a49021a10e164
-
SHA1
6d1b170fb830773cb750944938f2ada14499fd07
-
SHA256
d27692420e58cdd646e9a5bd19618387395ee4bc63d10bbe14fe3548e4546889
-
SHA512
4a4a8f86e7fe559771d401766b4df2f9e194f670222156330f150d72677b92b353d27d8ab43aadd0facae1babc3603bf78bb6e714be559cd9e56294384bbc1ce
-
SSDEEP
12288:hCmtiK5oKB2GisSjdcBL91Wl2sAzx9u7OSOI5ow5fpvgy2k:M+Fo62oSjd0nJw7OVChvgy2
Malware Config
Extracted
xloader
2.5
ohi3
itaewonbrunchbar.com
spectrosam.com
vanita-bavaria.net
kovrikydoma.store
tilthespire.com
aichuanghuan.com
healingyourbodynaturally.com
1790thirdavenue.com
zollogistics.com
inden-shop.com
fmhra.online
blenbigs.com
ofedward.com
efootball2021-eventpesmob.com
sutas-tr.com
ampersandcraftsuk.com
roofingcompaniestampa247.com
whwkjmhy4f.com
gngifts.com
bellezamarket.store
ebusinessdesignsolutions.com
asianm.art
k88fujita6459.com
fangweima.net
wns12688.com
jbysxjy.com
poundtech.xyz
ehawkstech.com
gypxjn.space
arizonawireproducts.com
pearl-street-art.com
getgrantmoneygov.com
kristinaticklerealtor.com
hetland-development.com
searingsloxzb.xyz
stary-love.com
hablandoespanol.net
338700.com
tacobelliever.com
mediciborgaretto.com
greenworlder-holding.com
wenbaokang.com
paulanercanada.com
sonatapetiti.quest
13192glensidedrive.info
fivestardriving.school
045yu.xyz
bosbabetogel.com
estreetcars.com
crochetbycare.com
hubinternationalinnovation.com
jishangban.com
swooningheartsenterprises.com
scbcommunity.partners
maonagrana.com
servuscollection.com
tactical-gamers.com
droneinspectionpro.com
gazetnydom.com
scottturns30.com
vch.biz
shein.black
amlakcore.com
umldbe.xyz
cctassetmanagement.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/1848-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1848-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1848-26-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1780-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3004 powershell.exe -
Deletes itself 1 IoCs
pid Process 1204 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2796 set thread context of 1848 2796 DOC09178236_20210922.exe 35 PID 1848 set thread context of 1196 1848 DOC09178236_20210922.exe 21 PID 1848 set thread context of 1196 1848 DOC09178236_20210922.exe 21 PID 1780 set thread context of 1196 1780 help.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOC09178236_20210922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2796 DOC09178236_20210922.exe 2796 DOC09178236_20210922.exe 2796 DOC09178236_20210922.exe 2796 DOC09178236_20210922.exe 1848 DOC09178236_20210922.exe 1848 DOC09178236_20210922.exe 3004 powershell.exe 1848 DOC09178236_20210922.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe 1780 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1848 DOC09178236_20210922.exe 1848 DOC09178236_20210922.exe 1848 DOC09178236_20210922.exe 1848 DOC09178236_20210922.exe 1780 help.exe 1780 help.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2796 DOC09178236_20210922.exe Token: SeDebugPrivilege 1848 DOC09178236_20210922.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 1780 help.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3004 2796 DOC09178236_20210922.exe 31 PID 2796 wrote to memory of 3004 2796 DOC09178236_20210922.exe 31 PID 2796 wrote to memory of 3004 2796 DOC09178236_20210922.exe 31 PID 2796 wrote to memory of 3004 2796 DOC09178236_20210922.exe 31 PID 2796 wrote to memory of 1412 2796 DOC09178236_20210922.exe 32 PID 2796 wrote to memory of 1412 2796 DOC09178236_20210922.exe 32 PID 2796 wrote to memory of 1412 2796 DOC09178236_20210922.exe 32 PID 2796 wrote to memory of 1412 2796 DOC09178236_20210922.exe 32 PID 2796 wrote to memory of 1640 2796 DOC09178236_20210922.exe 34 PID 2796 wrote to memory of 1640 2796 DOC09178236_20210922.exe 34 PID 2796 wrote to memory of 1640 2796 DOC09178236_20210922.exe 34 PID 2796 wrote to memory of 1640 2796 DOC09178236_20210922.exe 34 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 2796 wrote to memory of 1848 2796 DOC09178236_20210922.exe 35 PID 1196 wrote to memory of 1780 1196 Explorer.EXE 36 PID 1196 wrote to memory of 1780 1196 Explorer.EXE 36 PID 1196 wrote to memory of 1780 1196 Explorer.EXE 36 PID 1196 wrote to memory of 1780 1196 Explorer.EXE 36 PID 1780 wrote to memory of 1204 1780 help.exe 37 PID 1780 wrote to memory of 1204 1780 help.exe 37 PID 1780 wrote to memory of 1204 1780 help.exe 37 PID 1780 wrote to memory of 1204 1780 help.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1204
-
-