Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2024, 23:43 UTC

General

  • Target

    39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe

  • Size

    251KB

  • MD5

    130dc13fcd533d00374ef50177d8c54c

  • SHA1

    39c29125a8c776bd6eed886f346804a23d518b77

  • SHA256

    5614fc852594749ecfbc1f741c9a2ad20edce64652a5c422ed4ca7c5943184a7

  • SHA512

    2fce01506706dc9409ed2a231b43c439f76d86e921b7f51c8ba9fc8a044d1004dcce6c0beeda4ec4fcbf15f1df36160073ced6db7916228a5be2512205aa8587

  • SSDEEP

    6144:ownzthvTfFMFvH+RhBCTZQdENPrPe6VgyE0XeZu8/Y:TzHTeF+rY6yNK6SyBsY

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
    "C:\Users\Admin\AppData\Local\Temp\39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
      "C:\Users\Admin\AppData\Local\Temp\39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso76B8.tmp\rrkssezi.dll

    Filesize

    20KB

    MD5

    0b9de97b386a1a82cee5d3e059b7ec9b

    SHA1

    cc730fba70941afa39a9827fea215c9f099a6d01

    SHA256

    ad29dd53baa1e19fe4cacd99b9dea3b6e7fba8c6d89fe0492244de4414948e21

    SHA512

    b36cef8eb5fdf990ed79fd718a250e6f736e585516b4cfc97b7a0aba6f254e8997d8cf0262b0f4a894dc91e13c2b22aaa1eac554c2e23c42e50e8bc2fae3ad3d

  • memory/2804-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2984-8-0x0000000001E60000-0x0000000001E62000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.