Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC CICOOPLBL.exe
Resource
win7-20241010-en
General
-
Target
SHIPPING DOC CICOOPLBL.exe
-
Size
471KB
-
MD5
73eb22341ce8fcc60593432d2d37c872
-
SHA1
9aad11376e92a7b87ae2296e1c146ef88e2b3e15
-
SHA256
985c930f9f983d8ec93977335ebff73b477d7aaa678c163be58714525fb9f273
-
SHA512
d8735d3a85a992a5e14fcfc4fa6df9b2eed7039c118cfb6536e1242b9b995b1924b97d1ad16b7f90dd692d0d06f1f262fb0828e45558d8d4ce73bc89ff72911e
-
SSDEEP
6144:g34P86jIlgv5aK9rj5vVFfAb04v+M4/Vf9fkhqx4YYAdCSjtDU/5hL5WwHPc+nfe:eYd9rjB14v4//f13RcatDAL5Wwv9f6u
Malware Config
Extracted
xloader
2.3
xfts
dailiesplatform.com
krlanka.com
koms.info
chesslearner.com
softwarefully.com
yogiplayground.com
learhee.com
faithbook.info
pepperrefo.com
kratochvil-elektro.com
artbyg2.com
123-e.com
levelupyourbody.info
ecommercebusinessowner.com
floraseriestrilogy.com
sdyykt.com
swchof.com
huaxinhui.tech
sems-iress2016.com
vasudhalibrary.com
chummakizhi.com
gosleep-vietnam.com
plafon.one
sneakyhenry.com
x1699.com
flora4me.com
goofballtheclown.com
luckysevenboxesdesign.com
bioseefit-genuine.com
rjuanca.com
projectorcity.net
sustainablemedia.global
autoimmuneanswers.net
lessismoreee.com
xn--80aabjg7ciie7f.xn--p1acf
yourmoneyfuther.com
theatricsvirtual.com
appalachianholisticdentist.com
blaxies3.com
partycc.com
for-all-dream.com
szrhyl.com
databolism.com
loyalimportados.com
burnvioletinternational.com
graceinperspective.life
artsandfoodnyc.recipes
design4sys.com
medicalscreech.life
seeyouseeme.net
cernerarchive.net
ketamineinfusioncalgary.com
leagueofconsciouscreatives.com
triggerfishgroup.com
de-la-platiada.info
whatsmycurrency.com
stainset.com
museanimations.com
vip-5.com
corollabeachsetups.com
arcpest.com
kusamac.com
mustaphaswinga.com
dofreemovies.com
shhxqg.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4636-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4636-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4636-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2716-27-0x0000000001110000-0x0000000001139000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 58 2716 wscript.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2472 set thread context of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 4636 set thread context of 3464 4636 SHIPPING DOC CICOOPLBL.exe 56 PID 4636 set thread context of 3464 4636 SHIPPING DOC CICOOPLBL.exe 56 PID 2716 set thread context of 3464 2716 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHIPPING DOC CICOOPLBL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2472 SHIPPING DOC CICOOPLBL.exe 1044 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4172 cmd.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2472 SHIPPING DOC CICOOPLBL.exe 2472 SHIPPING DOC CICOOPLBL.exe 2472 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe 2716 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 4636 SHIPPING DOC CICOOPLBL.exe 2716 wscript.exe 2716 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2472 SHIPPING DOC CICOOPLBL.exe Token: SeDebugPrivilege 4636 SHIPPING DOC CICOOPLBL.exe Token: SeDebugPrivilege 2716 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1044 2472 SHIPPING DOC CICOOPLBL.exe 97 PID 2472 wrote to memory of 1044 2472 SHIPPING DOC CICOOPLBL.exe 97 PID 2472 wrote to memory of 1044 2472 SHIPPING DOC CICOOPLBL.exe 97 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 2472 wrote to memory of 4636 2472 SHIPPING DOC CICOOPLBL.exe 98 PID 3464 wrote to memory of 2716 3464 Explorer.EXE 99 PID 3464 wrote to memory of 2716 3464 Explorer.EXE 99 PID 3464 wrote to memory of 2716 3464 Explorer.EXE 99 PID 2716 wrote to memory of 4172 2716 wscript.exe 101 PID 2716 wrote to memory of 4172 2716 wscript.exe 101 PID 2716 wrote to memory of 4172 2716 wscript.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC CICOOPLBL.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC CICOOPLBL.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC CICOOPLBL.exe"{path}"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC CICOOPLBL.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC CICOOPLBL.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4172
-
-