Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
392ec0fdda5...fd.exe
windows7-x64
1092ec0fdda5...fd.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_2_/pingu...ll.exe
windows7-x64
7$_2_/pingu...ll.exe
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_2_/pinguino-uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_2_/pinguino-uninstall.exe
Resource
win10v2004-20241007-en
General
-
Target
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
-
Size
216KB
-
MD5
d3e4488ee4f30b87b4ff5aa8d517f526
-
SHA1
1113830356c3c941f5e7cbbb6e546b2d1401ced0
-
SHA256
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd
-
SHA512
d6a06dab2949b18b928d91ff226c86bc4b2a2963f595a2db4a00c02fce71a46e8e98bdfc4e1d4d7b2f77e2526eef320f25d786bc2f699f1f732992634e25d100
-
SSDEEP
6144:gsu5HeyqxoIzX9ZP9GlA4DgIuuZyQXTxWXrI:25QiIztvGUIzyQmI
Malware Config
Extracted
xloader
2.3
pb93
covidlawyersnj.com
zhgxzdh.com
mydomainaccounts.com
uniq.plus
snehapoorvam.com
anj-tradingltd.com
orderinglogin.com
1660688.com
cazconstructionservices.com
yildizwestern.com
futchampionz.com
starbritesmiles.com
viralxch.com
bandmanwiththeheadband.com
teachertechia.net
provenfitness.club
regentpublicity.net
meghaminz.com
mysuperdrink.com
redtomatoes.club
chicboreal.com
transferpricingautomation.com
konecationsystems.net
takeyourownheadshots.net
zhangzhengxi.com
dgbaisi.com
fanamshoes.com
acuitydemo.net
site123web.com
buddycritic.com
hearthenspeak.com
theslinglife.com
qqoutdoor.com
enablingservices.net
casinofredag.com
kazimark.com
holyskeptic.com
ilovebrowz.com
millevite.com
livrosdigitais.life
blairinsuranceservices.com
stm32heaven.com
wpstarter.tech
shivasonsgroup.com
readingisthenewblack.com
brendanandmary.com
tcgdmold.com
topbrandsport.com
scoolgirl.com
vigorouswillpower-group.com
checkripe.com
aktilestraders.com
criminalwomen.com
blackflexcellencefitness.com
beyondthespills.com
trumbullstudent.com
paralelevrencr.net
mimik33.info
capitaleaseusa.com
24k88cashfish.com
ilikesupersport.com
hairgrowinggenius.com
allianzworldwidepartners.sucks
ahfabhgbhkad24575.com
secured-connected.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2660-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2660-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2660-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2648-26-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3012 set thread context of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 2660 set thread context of 1212 2660 MSBuild.exe 21 PID 2660 set thread context of 1212 2660 MSBuild.exe 21 PID 2648 set thread context of 1212 2648 ipconfig.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2648 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2660 MSBuild.exe 2660 MSBuild.exe 2660 MSBuild.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe 2648 ipconfig.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 2660 MSBuild.exe 2660 MSBuild.exe 2660 MSBuild.exe 2660 MSBuild.exe 2648 ipconfig.exe 2648 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 MSBuild.exe Token: SeDebugPrivilege 2648 ipconfig.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 3012 wrote to memory of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 3012 wrote to memory of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 3012 wrote to memory of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 3012 wrote to memory of 2660 3012 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 30 PID 2660 wrote to memory of 2648 2660 MSBuild.exe 31 PID 2660 wrote to memory of 2648 2660 MSBuild.exe 31 PID 2660 wrote to memory of 2648 2660 MSBuild.exe 31 PID 2660 wrote to memory of 2648 2660 MSBuild.exe 31 PID 2648 wrote to memory of 2708 2648 ipconfig.exe 32 PID 2648 wrote to memory of 2708 2648 ipconfig.exe 32 PID 2648 wrote to memory of 2708 2648 ipconfig.exe 32 PID 2648 wrote to memory of 2708 2648 ipconfig.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f