Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 19:01

General

  • Target

    2024-03-11_cd37fef2ca7c05589f2a3d57808fecfb_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    cd37fef2ca7c05589f2a3d57808fecfb

  • SHA1

    50a67eef675c6dff3f808d536c2fc9450a240fdc

  • SHA256

    6b1cb3c11e13697c2d82a83cc7a72a0c12814d275f23143048d69bc748088b5f

  • SHA512

    1d173b4f099a6bc1859a3a9aec8950ad88b16f37aff2f2e926b6f700dc431d9e8143455dbc1ae72b2a2ab8f1a19107e05bb9a1d6042666ac52961d1d4e98c70d

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N+:DBIKRAGRe5K2UZK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_cd37fef2ca7c05589f2a3d57808fecfb_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_cd37fef2ca7c05589f2a3d57808fecfb_hacktools_xiaoba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761f24.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761f24.exe 259399460
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1456
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761f24.exe

    Filesize

    3.0MB

    MD5

    77a3d8056b65f6fbe8c4241b6227f8a5

    SHA1

    4eaa96a4981a9a10949748fdf117209415e9a021

    SHA256

    e87d1103445e86f386cc13d2e82619a0e9c9cb6d30b69b30521a3539f4eed6e9

    SHA512

    c4b01bced8e50e53029c7f393c1fe7f186683faa7e7f3a3b4985d6cf53f6f3331d355e51c0be9febe283675737e40b25f84c3ff0333ccd0de61ce860ccef064f

  • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761f24.exe

    Filesize

    3.2MB

    MD5

    6a6de3e0b1fcb80c318fcf74332f9e2b

    SHA1

    c8c303358247f09c020b2a71fca51f953136f53f

    SHA256

    f82325a5f8511de4b6219767f16c5677e9af5525afb702847768a1e79dde4c09

    SHA512

    10f9c21823bc715adf274fcca2396b167543652198f82235e8878ca59ae45154eec79fbe11652fa10370c9b0b1bef2d12482465cf23d203bdfe99dcedd4bb0a2

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761f24.exe

    Filesize

    2.1MB

    MD5

    267535a908d71f56427a89d4ebea7d30

    SHA1

    a1a4c3d3a502f0dae554f45fca6e977c502916f6

    SHA256

    ba19fa9e033d6ce0edcc0760848e8c739f2bf94cc395d9b88a0bf25f9ac620ed

    SHA512

    9c16033f423e92580f99c1ff5d0a2e4dc87030f45e8bdf41f88bf100d525b9501e13dc9301ec6c8ef2978e3db8627e79c6c5404839da651a163f97da107e35e3

  • memory/2720-13-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2720-14-0x00000000767D0000-0x00000000768D0000-memory.dmp

    Filesize

    1024KB

  • memory/2720-41-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2896-1-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2896-0-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2896-12-0x0000000002AD0000-0x0000000002E75000-memory.dmp

    Filesize

    3.6MB

  • memory/2896-11-0x0000000002AD0000-0x0000000002E75000-memory.dmp

    Filesize

    3.6MB

  • memory/2896-15-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB