Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 05:12

General

  • Target

    2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe

  • Size

    140KB

  • MD5

    6940b461e331d93e5408d4ad13cc1c47

  • SHA1

    97e9bbbda2a5b4d8de10a5832b1bb2bfaeaafdc3

  • SHA256

    2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172

  • SHA512

    60e7864655bf0ed894bccd5bae9077fab37d4345cc9f1c670f0d7b0ef12ea4fbd3a7b4212c634829bc45cd1eacb224177c5c977cad09227f0ba4ec417a542c17

  • SSDEEP

    3072:cB3u86LSsfXUPKMX1xLZsLwXloSx60ogKn1uqRW:cBSLSsfXUPKMX1xLZsLuoE60ogKn1u

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe
    "C:\Users\Admin\AppData\Local\Temp\2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\xoawu.exe
      "C:\Users\Admin\xoawu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xoawu.exe

    Filesize

    140KB

    MD5

    1aadc1bf75dc978ac1ac1f3cc0081b1f

    SHA1

    a497a1d3413ea79eb3c8b3d6080b588c59c8618b

    SHA256

    7ef18ebdd95b8374f1e8973c461ea7ec5bdfd9fcf49fd574643e693ecbfd3be0

    SHA512

    af62d32bec3cda59d4bad159cc8b00c552fffa01c9801cf8130d9af391a9cfec9a09f0c63dd6c3374c107949e027e95e0a8ce70c5d4d6f094253fd09e0d13949