Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win10v2004-20231222-en
General
-
Target
03161fb5ca408665e38e83f96734db56.exe
-
Size
91KB
-
MD5
03161fb5ca408665e38e83f96734db56
-
SHA1
72cfb45a17139dd9513d026f952b24dc018741dd
-
SHA256
7de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
-
SHA512
933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297
-
SSDEEP
1536:1pSwT9Wcm7i/V7vlYe7nof/MhzAt7FsomeikzLX3cYWXCOcpVjrCID4:zf9WcECV7a7f/WAt7FsXQLchL4VCID4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 OONOEO.EXE -
Loads dropped DLL 2 IoCs
pid Process 356 03161fb5ca408665e38e83f96734db56.exe 356 03161fb5ca408665e38e83f96734db56.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe File created C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 356 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 356 wrote to memory of 2056 356 03161fb5ca408665e38e83f96734db56.exe 28 PID 356 wrote to memory of 2056 356 03161fb5ca408665e38e83f96734db56.exe 28 PID 356 wrote to memory of 2056 356 03161fb5ca408665e38e83f96734db56.exe 28 PID 356 wrote to memory of 2056 356 03161fb5ca408665e38e83f96734db56.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:356 -
C:\WINDOWS\SysWOW64\OONOEO.EXEC:\WINDOWS\SYSTEM32\OONOEO.EXE C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\03161FB5CA408665E38E83F96734DB56.EXE2⤵
- Executes dropped EXE
PID:2056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD503161fb5ca408665e38e83f96734db56
SHA172cfb45a17139dd9513d026f952b24dc018741dd
SHA2567de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
SHA512933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297