Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe
Resource
win7-20241023-en
General
-
Target
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe
-
Size
491KB
-
MD5
38ceab9fa00f14db5b001bf1cdaa6f47
-
SHA1
9831dd267b5f5c5fbd79b9505f3ce6d13c65871e
-
SHA256
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067
-
SHA512
4a7a974da627ba3792e25b4f1d9a41a7eb32935b284254456da451b6c81a68505d867d93c08b86d978695bd73fc36337763c034dd54a7bde29a4a589611a0550
-
SSDEEP
12288:hX7DTteAIWWPaV47XuUcps+RR4hvLqdlRL3FpRbg3cMoJrxo:NrteA7D3ps/cm
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1508-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1508-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2784-23-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 692 set thread context of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 1508 set thread context of 1188 1508 RegSvcs.exe 21 PID 2784 set thread context of 1188 2784 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1508 RegSvcs.exe 1508 RegSvcs.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe 2784 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1508 RegSvcs.exe 1508 RegSvcs.exe 1508 RegSvcs.exe 2784 wscript.exe 2784 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1508 RegSvcs.exe Token: SeDebugPrivilege 2784 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 692 wrote to memory of 1508 692 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 31 PID 1188 wrote to memory of 2784 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2784 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2784 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2784 1188 Explorer.EXE 32 PID 2784 wrote to memory of 2768 2784 wscript.exe 33 PID 2784 wrote to memory of 2768 2784 wscript.exe 33 PID 2784 wrote to memory of 2768 2784 wscript.exe 33 PID 2784 wrote to memory of 2768 2784 wscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe"C:\Users\Admin\AppData\Local\Temp\30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-