Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
pipe & valve BOQ.exe
Resource
win7-20241010-en
General
-
Target
pipe & valve BOQ.exe
-
Size
946KB
-
MD5
3d6d52e92724d3263a059def176d723c
-
SHA1
855346c45d9999e16cfce314f0b7f9c603e442b5
-
SHA256
29217f28c065aea88d7d7faa350a69636974dc2c9955df8c14602978f304f47a
-
SHA512
d6a22067d317b183e42d1137ecbfdfae39d0c812f40a44e949d3e9caa7c86e1606db9537ad78e3d9001d8af9bab9b0b04dbcae630c2566b1d261b10b2b4af166
-
SSDEEP
12288:T1f1e3+FD+xlekccmbpJItaZP7XsLTNE6W3ORg2LYj7cLsLD+87KWO7Ss+poswcl:TLeOQzvwLsLTZg2Yj4AHTz
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2740-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2740 2164 pipe & valve BOQ.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 2740 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipe & valve BOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2164 wrote to memory of 2740 2164 pipe & valve BOQ.exe 29 PID 2740 wrote to memory of 3032 2740 RegSvcs.exe 30 PID 2740 wrote to memory of 3032 2740 RegSvcs.exe 30 PID 2740 wrote to memory of 3032 2740 RegSvcs.exe 30 PID 2740 wrote to memory of 3032 2740 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\pipe & valve BOQ.exe"C:\Users\Admin\AppData\Local\Temp\pipe & valve BOQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 363⤵
- Program crash
PID:3032
-
-