Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03161fb5ca408665e38e83f96734db56.exe
Resource
win10v2004-20231215-en
General
-
Target
03161fb5ca408665e38e83f96734db56.exe
-
Size
91KB
-
MD5
03161fb5ca408665e38e83f96734db56
-
SHA1
72cfb45a17139dd9513d026f952b24dc018741dd
-
SHA256
7de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
-
SHA512
933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297
-
SSDEEP
1536:1pSwT9Wcm7i/V7vlYe7nof/MhzAt7FsomeikzLX3cYWXCOcpVjrCID4:zf9WcECV7a7f/WAt7FsXQLchL4VCID4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 OONOEO.EXE -
Loads dropped DLL 2 IoCs
pid Process 2656 03161fb5ca408665e38e83f96734db56.exe 2656 03161fb5ca408665e38e83f96734db56.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe File opened for modification C:\Windows\SysWOW64\oonoeo.exe 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 03161fb5ca408665e38e83f96734db56.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2668 2656 03161fb5ca408665e38e83f96734db56.exe 28 PID 2656 wrote to memory of 2668 2656 03161fb5ca408665e38e83f96734db56.exe 28 PID 2656 wrote to memory of 2668 2656 03161fb5ca408665e38e83f96734db56.exe 28 PID 2656 wrote to memory of 2668 2656 03161fb5ca408665e38e83f96734db56.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"C:\Users\Admin\AppData\Local\Temp\03161fb5ca408665e38e83f96734db56.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\WINDOWS\SysWOW64\OONOEO.EXEC:\WINDOWS\SYSTEM32\OONOEO.EXE C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\03161FB5CA408665E38E83F96734DB56.EXE2⤵
- Executes dropped EXE
PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD503161fb5ca408665e38e83f96734db56
SHA172cfb45a17139dd9513d026f952b24dc018741dd
SHA2567de30f5ae66264f2af3512845cb62d693b2d7e9a65a5be82d6938d66a2128983
SHA512933e6651d193c00883f2dba9fdc0e015728e510c3041fe14c004010c6f566bf74c2e5d68eff45a50d1aaa485b0733667dcef95cf24ec29e5c2b299823b251297