Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 11:51 UTC

General

  • Target

    ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe

  • Size

    833KB

  • MD5

    95aebcd3e565cfa0931716c469d8cc8e

  • SHA1

    d5ee92a7a75f7316d93c85b551192241a2617c01

  • SHA256

    ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097

  • SHA512

    f14ee0ac839d2021e91acb90064a15f69e29d0395b02b1b0897d093cf154b8d530f04f14070dacc9548aa8efcf46a59aad42560068b67dffaeceee4d3580dca3

  • SSDEEP

    12288:uU1KRUi2iNmZQcdYI3Nj2G6RTWGlIl4Um0rQg:uU1gUi10l2WCIl46

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

a49i

Decoy

myprobioticspayme.com

shavers.today

cinqueportshealthcare.com

itmservicesincne.com

credit-comparison.com

xn--2kr800ab2z.group

onlinebiyoloji.online

risaki.net

americasgotargument.com

rosinterpro.com

cortadoresdejamon.biz

hotamourclub.art

boettcherlaw.com

nuciic.com

redesdelraco.com

chivang.com

yourkstreetexperience.com

yourwaykeji.com

natureate.com

bidyawasterecycling.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
    "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe
      "C:\Users\Admin\AppData\Local\Temp\ef2032491253495ad9e2e5c74e8e30c77aa3f23b5d787d1e4408b6b51a9a0097.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2864

Network

  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    64.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    64.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    120.250.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    120.250.22.2.in-addr.arpa
    IN PTR
    Response
    120.250.22.2.in-addr.arpa
    IN PTR
    a2-22-250-120deploystaticakamaitechnologiescom
  • flag-us
    DNS
    156.133.100.95.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    156.133.100.95.in-addr.arpa
    IN PTR
    Response
    156.133.100.95.in-addr.arpa
    IN PTR
    a95-100-133-156deploystaticakamaitechnologiescom
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    64.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    64.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    120.250.22.2.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    120.250.22.2.in-addr.arpa

  • 8.8.8.8:53
    156.133.100.95.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    156.133.100.95.in-addr.arpa

  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2864-11-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2864-14-0x0000000001810000-0x0000000001B5A000-memory.dmp

    Filesize

    3.3MB

  • memory/4568-6-0x0000000005AA0000-0x0000000005AAE000-memory.dmp

    Filesize

    56KB

  • memory/4568-3-0x00000000057A0000-0x0000000005832000-memory.dmp

    Filesize

    584KB

  • memory/4568-5-0x0000000005950000-0x000000000595A000-memory.dmp

    Filesize

    40KB

  • memory/4568-4-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/4568-0-0x000000007539E000-0x000000007539F000-memory.dmp

    Filesize

    4KB

  • memory/4568-7-0x000000007539E000-0x000000007539F000-memory.dmp

    Filesize

    4KB

  • memory/4568-8-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/4568-9-0x00000000065E0000-0x000000000667C000-memory.dmp

    Filesize

    624KB

  • memory/4568-10-0x00000000067D0000-0x0000000006822000-memory.dmp

    Filesize

    328KB

  • memory/4568-2-0x0000000005D50000-0x00000000062F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4568-13-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/4568-1-0x0000000000CE0000-0x0000000000DB6000-memory.dmp

    Filesize

    856KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.