Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win10v2004-20231222-en
General
-
Target
03161fb5ca408665e38e83f96734db56.exe
-
Size
91KB
-
MD5
03161fb5ca408665e38e83f96734db56
-
SHA1
72cfb45a17139dd9513d026f952b24dc018741dd
-
SHA256
7de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
-
SHA512
933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297
-
SSDEEP
1536:1pSwT9Wcm7i/V7vlYe7nof/MhzAt7FsomeikzLX3cYWXCOcpVjrCID4:zf9WcECV7a7f/WAt7FsXQLchL4VCID4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1800 OONOEO.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe File opened for modification C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1800 2540 03161fb5ca408665e38e83f96734db56.exe 86 PID 2540 wrote to memory of 1800 2540 03161fb5ca408665e38e83f96734db56.exe 86 PID 2540 wrote to memory of 1800 2540 03161fb5ca408665e38e83f96734db56.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\WINDOWS\SysWOW64\OONOEO.EXEC:\WINDOWS\SYSTEM32\OONOEO.EXE C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\03161FB5CA408665E38E83F96734DB56.EXE2⤵
- Executes dropped EXE
PID:1800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD503161fb5ca408665e38e83f96734db56
SHA172cfb45a17139dd9513d026f952b24dc018741dd
SHA2567de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
SHA512933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297