Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
392ec0fdda5...fd.exe
windows7-x64
1092ec0fdda5...fd.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_2_/pingu...ll.exe
windows7-x64
7$_2_/pingu...ll.exe
windows10-2004-x64
7Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_2_/pinguino-uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_2_/pinguino-uninstall.exe
Resource
win10v2004-20241007-en
General
-
Target
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe
-
Size
216KB
-
MD5
d3e4488ee4f30b87b4ff5aa8d517f526
-
SHA1
1113830356c3c941f5e7cbbb6e546b2d1401ced0
-
SHA256
92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd
-
SHA512
d6a06dab2949b18b928d91ff226c86bc4b2a2963f595a2db4a00c02fce71a46e8e98bdfc4e1d4d7b2f77e2526eef320f25d786bc2f699f1f732992634e25d100
-
SSDEEP
6144:gsu5HeyqxoIzX9ZP9GlA4DgIuuZyQXTxWXrI:25QiIztvGUIzyQmI
Malware Config
Extracted
xloader
2.3
pb93
covidlawyersnj.com
zhgxzdh.com
mydomainaccounts.com
uniq.plus
snehapoorvam.com
anj-tradingltd.com
orderinglogin.com
1660688.com
cazconstructionservices.com
yildizwestern.com
futchampionz.com
starbritesmiles.com
viralxch.com
bandmanwiththeheadband.com
teachertechia.net
provenfitness.club
regentpublicity.net
meghaminz.com
mysuperdrink.com
redtomatoes.club
chicboreal.com
transferpricingautomation.com
konecationsystems.net
takeyourownheadshots.net
zhangzhengxi.com
dgbaisi.com
fanamshoes.com
acuitydemo.net
site123web.com
buddycritic.com
hearthenspeak.com
theslinglife.com
qqoutdoor.com
enablingservices.net
casinofredag.com
kazimark.com
holyskeptic.com
ilovebrowz.com
millevite.com
livrosdigitais.life
blairinsuranceservices.com
stm32heaven.com
wpstarter.tech
shivasonsgroup.com
readingisthenewblack.com
brendanandmary.com
tcgdmold.com
topbrandsport.com
scoolgirl.com
vigorouswillpower-group.com
checkripe.com
aktilestraders.com
criminalwomen.com
blackflexcellencefitness.com
beyondthespills.com
trumbullstudent.com
paralelevrencr.net
mimik33.info
capitaleaseusa.com
24k88cashfish.com
ilikesupersport.com
hairgrowinggenius.com
allianzworldwidepartners.sucks
ahfabhgbhkad24575.com
secured-connected.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4516-13-0x0000000000550000-0x0000000000579000-memory.dmp xloader behavioral2/memory/4516-17-0x0000000000550000-0x0000000000579000-memory.dmp xloader behavioral2/memory/4516-21-0x0000000000550000-0x0000000000579000-memory.dmp xloader behavioral2/memory/1944-29-0x0000000000C60000-0x0000000000C89000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5048 set thread context of 4516 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 82 PID 4516 set thread context of 3416 4516 MSBuild.exe 56 PID 4516 set thread context of 3416 4516 MSBuild.exe 56 PID 1944 set thread context of 3416 1944 WWAHost.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe 1944 WWAHost.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 4516 MSBuild.exe 1944 WWAHost.exe 1944 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4516 MSBuild.exe Token: SeDebugPrivilege 1944 WWAHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4516 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 82 PID 5048 wrote to memory of 4516 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 82 PID 5048 wrote to memory of 4516 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 82 PID 5048 wrote to memory of 4516 5048 92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe 82 PID 4516 wrote to memory of 1944 4516 MSBuild.exe 90 PID 4516 wrote to memory of 1944 4516 MSBuild.exe 90 PID 4516 wrote to memory of 1944 4516 MSBuild.exe 90 PID 1944 wrote to memory of 4756 1944 WWAHost.exe 91 PID 1944 wrote to memory of 4756 1944 WWAHost.exe 91 PID 1944 wrote to memory of 4756 1944 WWAHost.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\92ec0fdda57232d435885971959cc65ede66e19f7ea7673798e97344008369fd.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f