Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
bb21686fc33c1297090680f3ace7fa37
-
SHA1
3e853dc91c3f8d69390a309854287ab00804d9f8
-
SHA256
f8bd45f68e8ea8317986376bd0665317fa5677fdb67eb7826832e3dd617573c7
-
SHA512
479d27e4af38195b5f92e40cfc1b5a8371472965448f294b656a97554a6e2fea2961611b3c4148a6f65125b2e1173c9864acab3e346369042747e9d8d65acf6f
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NT:DBIKRAGRe5K2UZH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 f761593.exe -
Loads dropped DLL 9 IoCs
pid Process 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2644 1740 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 1740 f761593.exe 1740 f761593.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1740 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 28 PID 1656 wrote to memory of 1740 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 28 PID 1656 wrote to memory of 1740 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 28 PID 1656 wrote to memory of 1740 1656 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 28 PID 1740 wrote to memory of 2644 1740 f761593.exe 30 PID 1740 wrote to memory of 2644 1740 f761593.exe 30 PID 1740 wrote to memory of 2644 1740 f761593.exe 30 PID 1740 wrote to memory of 2644 1740 f761593.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761593.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761593.exe 2593970112⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 6043⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD53e4ca2be6bba742460f1cab6744914cd
SHA1491d7e867ba2f42cf37dece0a216f986763f1f0f
SHA25686d460ab3ab982e6981c968a554852fde66ee2ef1acab9c011596ae6bfc0bdb4
SHA512d6ba51534b1b3020a28575bf1eb65c7c9befbb6dcac4753d0b4c5939a027749de7a4585e36d95ebb843e57f0ad8a92f08189c576185abdd888f892447d0b20e4