Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 20:29 UTC

General

  • Target

    Purchase Order# 210145.exe

  • Size

    1.2MB

  • MD5

    943c2878d92004d2705f0d568838620b

  • SHA1

    c134f3cd18715f1451f48bb10747779609284362

  • SHA256

    30b8f5e97d96ca11c0358b295e60a3dfba91f6eeaa616fd6f1f616326cac8d63

  • SHA512

    cebf61b3e58038e90d4f1846d46ab069b9da8ca2715eebf0b5ce8330924bf9f905013c7d5cf34f5790efe4ef726a56c56bae33c032204f56aadf6eaee5370e6a

  • SSDEEP

    24576:jyvWI9raNq5Kpi+0IMTJVd+7J2Y9J2WV/Nm/y12Nhml:jXIFaNI+0zTJr+vcyYA

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

imm8

Decoy

insteuctire.com

zomkeroad.icu

setiptv.pro

hk2good.com

writerby.com

giftebuy.com

siterising.com

learnsmartly.net

paanopinoy.com

jerikocreativehub.com

whitenoisestore.com

itownfwl.com

kumamotors.com

luxqueen.club

psychiaterinschweiz.net

sanchez-gomez.info

seriesplum.com

eagleweldingmn.com

6917199.com

kundantanti.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order# 210145.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order# 210145.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\Purchase Order# 210145.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase Order# 210145.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order# 210145.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-18-0x00000000070D0000-0x0000000007241000-memory.dmp

    Filesize

    1.4MB

  • memory/1388-22-0x00000000070D0000-0x0000000007241000-memory.dmp

    Filesize

    1.4MB

  • memory/2192-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-17-0x0000000000160000-0x0000000000170000-memory.dmp

    Filesize

    64KB

  • memory/2192-14-0x0000000000880000-0x0000000000B83000-memory.dmp

    Filesize

    3.0MB

  • memory/2192-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2272-7-0x0000000000CD0000-0x0000000000D24000-memory.dmp

    Filesize

    336KB

  • memory/2272-3-0x00000000004A0000-0x00000000004BC000-memory.dmp

    Filesize

    112KB

  • memory/2272-6-0x0000000005190000-0x0000000005216000-memory.dmp

    Filesize

    536KB

  • memory/2272-13-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2272-5-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2272-4-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/2272-0-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/2272-2-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2272-1-0x0000000001390000-0x00000000014CC000-memory.dmp

    Filesize

    1.2MB

  • memory/3020-19-0x0000000000250000-0x0000000000258000-memory.dmp

    Filesize

    32KB

  • memory/3020-20-0x0000000000250000-0x0000000000258000-memory.dmp

    Filesize

    32KB

  • memory/3020-21-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.