Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
package delivery failed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
package delivery failed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/srrk.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/srrk.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/srrk.dll
-
Size
99KB
-
MD5
a3caa7e8895fb8eccc4cfc84c2f37283
-
SHA1
0c10231f8b45a1f6d9037fab396310a35fc572c5
-
SHA256
7b153187b30e47fda2f39d2621c04dded4e6776fabbebf5cc6a6a157a8324c02
-
SHA512
b96bdf0909a777ff559d31ac0600a5bbf90fcfa322232b4818ee275a2fda7638c4d06cb493f746a79e30367400ce2d252c46918e3dfbed851be81d1399b42c16
-
SSDEEP
1536:3pnXZ18vqXVzM4Ne15d1/LcIbUfsjsQ1uUYdYcj8Z:3pXZOIzM40FXV1WfjM
Malware Config
Extracted
xloader
2.5
u4an
crossroadsinndfs.com
reichsland.top
tomrose.net
zoneindrones.net
814851.com
pingblackjack.com
pdsolutions.tech
sweethomecolorado.net
witterx.com
beneschcyberconsulting.com
electroborg.com
metodopita.com
picklericktoken.com
alkhawatercafe.com
lelittnpasumo4.xyz
osrr.top
khonnaisoi.com
jbbaudienstleistungen.com
theconfidenceboosterprogram.com
diamondtrade.net
monakko.net
localproperty.team
thpanel.space
vivatitech.com
owaygeo.com
promo-solana.com
icarus-groupe.com
kansaspetshop.com
thelumenclinic.com
prostitutkiizhevskarelax.info
iluniui.com
aitmrdap.com
empiremunitions.com
socio.mobi
henagraphic.com
universobraasilshop.com
garlicjoysnap.xyz
784211.com
evanocrm.com
nousecos.com
suddennnnnnnnnnnn05.xyz
mcintoshelections.com
terrapack.net
aquaeyego.com
alardellyux.com
thekatz.group
b8ouzr.biz
urteuzemni.quest
paciloop.com
regencyimperial.com
coqttwvfwc.com
rapaddix.com
xn--pgb3df.com
city-trustonline.com
merakilifestyleconsulting.com
ratnagirikosh.com
munixc.info
alseermarine-defence.com
nastymales.com
woodrichevents.com
junyechoo.net
vertentebike.com
bestofsaltlakecity.net
betterlifegarciniatechnow.com
masa88.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2320-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2320-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2052-11-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2604 set thread context of 2320 2604 rundll32.exe 30 PID 2320 set thread context of 1192 2320 rundll32.exe 20 PID 2052 set thread context of 1192 2052 NAPSTAT.EXE 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2320 rundll32.exe 2320 rundll32.exe 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2320 rundll32.exe 2320 rundll32.exe 2320 rundll32.exe 2052 NAPSTAT.EXE 2052 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2320 rundll32.exe Token: SeDebugPrivilege 2052 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2580 wrote to memory of 2604 2580 rundll32.exe 29 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 2604 wrote to memory of 2320 2604 rundll32.exe 30 PID 1192 wrote to memory of 2052 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2052 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2052 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2052 1192 Explorer.EXE 31 PID 2052 wrote to memory of 2068 2052 NAPSTAT.EXE 32 PID 2052 wrote to memory of 2068 2052 NAPSTAT.EXE 32 PID 2052 wrote to memory of 2068 2052 NAPSTAT.EXE 32 PID 2052 wrote to memory of 2068 2052 NAPSTAT.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\srrk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\srrk.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\srrk.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-