Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
bb21686fc33c1297090680f3ace7fa37
-
SHA1
3e853dc91c3f8d69390a309854287ab00804d9f8
-
SHA256
f8bd45f68e8ea8317986376bd0665317fa5677fdb67eb7826832e3dd617573c7
-
SHA512
479d27e4af38195b5f92e40cfc1b5a8371472965448f294b656a97554a6e2fea2961611b3c4148a6f65125b2e1173c9864acab3e346369042747e9d8d65acf6f
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NT:DBIKRAGRe5K2UZH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1400 e573d67.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1156 1400 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3032 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 3032 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 1400 e573d67.exe 1400 e573d67.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1400 3032 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 81 PID 3032 wrote to memory of 1400 3032 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 81 PID 3032 wrote to memory of 1400 3032 2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-10_bb21686fc33c1297090680f3ace7fa37_hacktools_xiaoba.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e573d67.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e573d67.exe 2405983902⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 15603⤵
- Program crash
PID:1156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1400 -ip 14001⤵PID:3092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5f8bbbe6a1eb8648eae75dfc4c704fa13
SHA1bb10bc65c199e66dec4ba38ad81c516a87767326
SHA256d273ccc70d56b2d73e53b074f9b3610ab3fb6a2374a95d1d2803008e6e2bfb82
SHA51263213da1ca4ed00f2130585b5847783f6217b78345f56cbd814f1485a8a13719e8168e0d04937c5b97301c119598b53226eb2fc2ea376797c5bacd8f6509a005