Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
ComparisonComparer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ComparisonComparer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
po.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
po.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
poo.exe
Resource
win7-20240903-en
General
-
Target
po.exe
-
Size
968KB
-
MD5
7c8206e11a3f0a3832c65ee22ca21819
-
SHA1
fb255b2ee75cc76180daddb78c7cf912eb248f06
-
SHA256
f8cdb91e57d80dd935b4490720b39d75db0443fac602c9d4cdab434aa82a6a43
-
SHA512
b230d0ebeddb1641a2f63286b8d90d7f7d83b03f5cec4d7433e8463dc22796c9bf657bb487ab7f57221173cd42721b27289dc2e7f8f9817fcd3f6a6968c5bca2
-
SSDEEP
24576:AyCb02+HEYq7j15AD9UvCVPA/012j1DkdZ:px3HZqdcUS2Jkd
Malware Config
Extracted
xloader
2.3
i9me
claimbrosprospecting.com
visionnaire.design
russmatsuo.com
phpower.com
themaitregroup.net
perderson.space
signaturewallcoverings.com
mesharifoundation.com
mastjio.com
ngstarshub.com
teamsdialpad.com
handysyed.com
basalgoods.company
miniletics.com
reidasmaquinasdolitoral.com
signsgadsden.com
huigukeji.net
yesonmeasurez.com
rwingbistro.com
xn--90aoahqe0a0f.xn--p1acf
sapojm.com
c-ou.com
constructionpro.online
evidenceofglory.com
ingenuwitty.com
windyhillneighborhood.com
polygraphok.com
adrianschmidt.info
jr-114.com
muslimbookclub.com
messi-and-ronaldo.com
ncstake.com
applelaptopservice.center
barkinlot.com
pjshr.com
consultphysicians.com
sonderhomehealth.com
clockworkhomeserviceslv.com
sendnownow.com
travelcampaigner.com
wordshirts.store
bellasolsalon.com
sachach.com
acme-ecomm-corp.com
joshuadawsonart.com
cowgirlways.com
folkfameb.com
panakha.com
nekum.com
space2sell.net
the8thmajor.com
dlta22.com
contorig2.com
rixso-holding.com
tropicalchasers.com
citestaccnt1597664033.com
loud.cool
slotomaniavp.com
southpawgymfranchise.com
lifewithhippo.com
counselorchristy.com
emmaluukkonen.com
delreyvending.com
thepoocheparlor.com
happynrg.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral3/memory/2108-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 2108 1684 po.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 1296 2108 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 po.exe 1684 po.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 po.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 1684 wrote to memory of 2108 1684 po.exe 31 PID 2108 wrote to memory of 1296 2108 po.exe 32 PID 2108 wrote to memory of 1296 2108 po.exe 32 PID 2108 wrote to memory of 1296 2108 po.exe 32 PID 2108 wrote to memory of 1296 2108 po.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 363⤵
- Program crash
PID:1296
-
-