Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
DOC09178236_20210922.exe
Resource
win7-20240903-en
General
-
Target
DOC09178236_20210922.exe
-
Size
734KB
-
MD5
38cb740b60d846d2a14a49021a10e164
-
SHA1
6d1b170fb830773cb750944938f2ada14499fd07
-
SHA256
d27692420e58cdd646e9a5bd19618387395ee4bc63d10bbe14fe3548e4546889
-
SHA512
4a4a8f86e7fe559771d401766b4df2f9e194f670222156330f150d72677b92b353d27d8ab43aadd0facae1babc3603bf78bb6e714be559cd9e56294384bbc1ce
-
SSDEEP
12288:hCmtiK5oKB2GisSjdcBL91Wl2sAzx9u7OSOI5ow5fpvgy2k:M+Fo62oSjd0nJw7OVChvgy2
Malware Config
Extracted
xloader
2.5
ohi3
itaewonbrunchbar.com
spectrosam.com
vanita-bavaria.net
kovrikydoma.store
tilthespire.com
aichuanghuan.com
healingyourbodynaturally.com
1790thirdavenue.com
zollogistics.com
inden-shop.com
fmhra.online
blenbigs.com
ofedward.com
efootball2021-eventpesmob.com
sutas-tr.com
ampersandcraftsuk.com
roofingcompaniestampa247.com
whwkjmhy4f.com
gngifts.com
bellezamarket.store
ebusinessdesignsolutions.com
asianm.art
k88fujita6459.com
fangweima.net
wns12688.com
jbysxjy.com
poundtech.xyz
ehawkstech.com
gypxjn.space
arizonawireproducts.com
pearl-street-art.com
getgrantmoneygov.com
kristinaticklerealtor.com
hetland-development.com
searingsloxzb.xyz
stary-love.com
hablandoespanol.net
338700.com
tacobelliever.com
mediciborgaretto.com
greenworlder-holding.com
wenbaokang.com
paulanercanada.com
sonatapetiti.quest
13192glensidedrive.info
fivestardriving.school
045yu.xyz
bosbabetogel.com
estreetcars.com
crochetbycare.com
hubinternationalinnovation.com
jishangban.com
swooningheartsenterprises.com
scbcommunity.partners
maonagrana.com
servuscollection.com
tactical-gamers.com
droneinspectionpro.com
gazetnydom.com
scottturns30.com
vch.biz
shein.black
amlakcore.com
umldbe.xyz
cctassetmanagement.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/784-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/784-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4876-73-0x0000000000A50000-0x0000000000A79000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3116 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DOC09178236_20210922.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2616 set thread context of 784 2616 DOC09178236_20210922.exe 102 PID 784 set thread context of 3364 784 DOC09178236_20210922.exe 56 PID 4876 set thread context of 3364 4876 msiexec.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOC09178236_20210922.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 784 DOC09178236_20210922.exe 784 DOC09178236_20210922.exe 784 DOC09178236_20210922.exe 784 DOC09178236_20210922.exe 3116 powershell.exe 3116 powershell.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe 4876 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 784 DOC09178236_20210922.exe 784 DOC09178236_20210922.exe 784 DOC09178236_20210922.exe 4876 msiexec.exe 4876 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 784 DOC09178236_20210922.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 4876 msiexec.exe Token: SeShutdownPrivilege 3364 Explorer.EXE Token: SeCreatePagefilePrivilege 3364 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3116 2616 DOC09178236_20210922.exe 100 PID 2616 wrote to memory of 3116 2616 DOC09178236_20210922.exe 100 PID 2616 wrote to memory of 3116 2616 DOC09178236_20210922.exe 100 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 2616 wrote to memory of 784 2616 DOC09178236_20210922.exe 102 PID 3364 wrote to memory of 4876 3364 Explorer.EXE 104 PID 3364 wrote to memory of 4876 3364 Explorer.EXE 104 PID 3364 wrote to memory of 4876 3364 Explorer.EXE 104 PID 4876 wrote to memory of 4404 4876 msiexec.exe 105 PID 4876 wrote to memory of 4404 4876 msiexec.exe 105 PID 4876 wrote to memory of 4404 4876 msiexec.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1112
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DOC09178236_20210922.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82