Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
sekfuer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
sekfuer.exe
Resource
win10v2004-20241007-en
General
-
Target
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
-
Size
318KB
-
MD5
7b3ac47b7e0a3b84ae5a4a34c3b37503
-
SHA1
6b73e3bcff26f7b9d805bdf839271478e10d3aa9
-
SHA256
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10
-
SHA512
dcb5b2ee9a55376699a733be65f8fdc5f482d2305447c67341577b40aabc9d27b34a76beb328daf3478ecd23e47d2064fb4b419f89cc3d2e0673e0c755d11105
-
SSDEEP
6144:TxDuIshmUqiRw6gPmFyggTDL40FbL5COzewlSUeGaSH+g:EIJ3hg9OHJCOa4FeGaDg
Malware Config
Extracted
xloader
2.5
b0ar
luckyjangteo.com
iots.top
kavakshop.com
perp.review
innasamudra.com
adclw.net
dinerboard.com
sempionhosting.com
welcome-sber.store
akcgoldenretrievers.com
bay-frame.com
myteethdental108.com
ya-diver.com
liuxuemba.com
knopfluiro.quest
ccaiai.top
centurypropertiespk.com
ministryofpup.com
2chemistry.com
zichtlijn.net
ovth-cksu.com
unitedsoftwarepartners.com
springvalleyplumbers.com
sikiich.com
emobilemarket.com
abbaconstrucoes.com
littlepinkrocks.com
showjesusalldayeveryday.com
mimihin.com
haveromegroups.com
heiparagraph.xyz
treslido.quest
thelearningloftnc.com
zhongzeyan.com
vivibanca.website
sucreuni.com
famindum.store
etavideo.xyz
mkideaz.com
boreapeyacht.club
leumj-onlin.com
benchmarklandscapingfl.com
paddocklakehouse.com
yourpracticalmystik.com
royalbrandclassic.com
buschhuntingatvsweeps.com
fol-services.com
helprulesform.com
tvsmarters.com
mimbresdesign.com
dontjointhearmyyet.com
hornybimbo.com
vscosocial.xyz
dualipaphiladelphia.com
strataguide.com
ardendanismanlik.com
indutec.gmbh
cleanandsafe.travel
thepropertymatterslawfirm.com
belugacdn.xyz
comking-tj.com
gerardabing.com
kyliejnz.com
utilizame.com
publicdefenderprivacy.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2212-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2212-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2940-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2512 sekfuer.exe 2212 sekfuer.exe -
Loads dropped DLL 2 IoCs
pid Process 1760 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 2512 sekfuer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2512 set thread context of 2212 2512 sekfuer.exe 31 PID 2212 set thread context of 1284 2212 sekfuer.exe 21 PID 2940 set thread context of 1284 2940 colorcpl.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sekfuer.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2212 sekfuer.exe 2212 sekfuer.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe 2940 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2212 sekfuer.exe 2212 sekfuer.exe 2212 sekfuer.exe 2940 colorcpl.exe 2940 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2212 sekfuer.exe Token: SeDebugPrivilege 2940 colorcpl.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2512 1760 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 30 PID 1760 wrote to memory of 2512 1760 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 30 PID 1760 wrote to memory of 2512 1760 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 30 PID 1760 wrote to memory of 2512 1760 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 30 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 2512 wrote to memory of 2212 2512 sekfuer.exe 31 PID 1284 wrote to memory of 2940 1284 Explorer.EXE 32 PID 1284 wrote to memory of 2940 1284 Explorer.EXE 32 PID 1284 wrote to memory of 2940 1284 Explorer.EXE 32 PID 1284 wrote to memory of 2940 1284 Explorer.EXE 32 PID 2940 wrote to memory of 3068 2940 colorcpl.exe 33 PID 2940 wrote to memory of 3068 2940 colorcpl.exe 33 PID 2940 wrote to memory of 3068 2940 colorcpl.exe 33 PID 2940 wrote to memory of 3068 2940 colorcpl.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe"C:\Users\Admin\AppData\Local\Temp\5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\sekfuer.exeC:\Users\Admin\AppData\Local\Temp\sekfuer.exe C:\Users\Admin\AppData\Local\Temp\kxvtoctk3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\sekfuer.exeC:\Users\Admin\AppData\Local\Temp\sekfuer.exe C:\Users\Admin\AppData\Local\Temp\kxvtoctk4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\sekfuer.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d6b23032a09ffeb6abcde5d358a4a811
SHA1f38ceb3fb628a218f6e622b664487a5fc7e9cbe5
SHA256e9c6a985773580b2c3bbce4b42e8bffea84c4fd682588cbf1c8ff4c6a4a2604c
SHA512a0d379a6426fbb6eb368935fc5fdf0c168ea7742f324cf0dbec2e3987c86ee9967fccad309b3d525bf1f371a66f6d4a843b48a30f8ec9a161a94d052dc9c5c15
-
Filesize
4KB
MD503f193756bc6453453b4211edc08b400
SHA18d51ca5d3ccbcc6b596ccc318c79e4b041cc7917
SHA256920d6c6a4ef09c4e3bbc4b9b609bc0992d19dd64d1243e16a030ad31e4c8dc3e
SHA512b33fd3a30a3f9e19054543f6fc6ed4d7dc730715fc92f4c5a8403ac8f0d4e94a5c5222ffda32dcfed4aa8ce6bf351a59ea6610c819975893bcad2f9b1696bbcd
-
Filesize
175KB
MD5726feddb203f26ef36c573c5305d97f8
SHA10c88f5fe319fc16f18f924d57837c1cd8e1ddc07
SHA2566c1038acb3f2815c1e332a37fac58ec85cf3737a6e6792e2dbf6a0a2c0ed00c4
SHA51223ec28b39d0ab1c6dbc2fc2b9f7331a2610df03492522842517d41c52dffecf92d3ee688612134697495e5184f9ec8ac066e0b092eb637967ea5f220e83dd99a