Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
58553fa33ea02fa367324fdd3fd850b2
-
SHA1
151e974bfa45e2fad84b9271a7d93da763bbd1ad
-
SHA256
8342c5cc77de10fd884b7f273e79ffe9dc6080af263991edda52675cab9dee17
-
SHA512
aa90464d362107d942b1619900f66d7034b0966cfaf7ace84113af90a3d5585007f5317dc0be3b296f875bd70aaaf00e1f7a10518411aac1d36fc3c9683630bc
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NB:DBIKRAGRe5K2UZV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 f76ac94.exe -
Loads dropped DLL 9 IoCs
pid Process 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 2272 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 2272 f76ac94.exe 2272 f76ac94.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2272 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 28 PID 1640 wrote to memory of 2272 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 28 PID 1640 wrote to memory of 2272 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 28 PID 1640 wrote to memory of 2272 1640 2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe 28 PID 2272 wrote to memory of 2588 2272 f76ac94.exe 30 PID 2272 wrote to memory of 2588 2272 f76ac94.exe 30 PID 2272 wrote to memory of 2588 2272 f76ac94.exe 30 PID 2272 wrote to memory of 2588 2272 f76ac94.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_58553fa33ea02fa367324fdd3fd850b2_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76ac94.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76ac94.exe 2594357312⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 14763⤵
- Loads dropped DLL
- Program crash
PID:2588
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59b9ee553e29f172e93b3ce4cf04b9c22
SHA1b5391551f7540d646f13cd19520fcb5ed18ef831
SHA256d32f4a70b88c54ebb6d7bd1f13e96976eeda8139d439dd4ccca2bca3bbe87125
SHA5126f529744c8a695c6d636f9389e41fe2f125e027f9ee67d50efc880aeeb647c26be46eb1d20e6697a5d3271166b276e8c633c7b788d905bac421d9f01bf5577cb