Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
d2e8e5c5eeac271d22fde03eeccb9053
-
SHA1
2bbfa26396ed461191c8e90caf95f5be74333d0f
-
SHA256
6adf7284c5a6908a64e20b4cfa62ea7c2a72772ede71219e5fe89017cd7e1923
-
SHA512
401f6f15a59e9f12316e7953111000fba6480e3c9a91bdc7a9bfa12b68403bf4adf65334e489dc4d45bb26850ee960fbe4415249d457510d4e4362cdb942350a
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NA:DBIKRAGRe5K2UZU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1184 f761084.exe -
Loads dropped DLL 9 IoCs
pid Process 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2760 1184 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 1184 f761084.exe 1184 f761084.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1184 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 28 PID 1632 wrote to memory of 1184 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 28 PID 1632 wrote to memory of 1184 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 28 PID 1632 wrote to memory of 1184 1632 2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe 28 PID 1184 wrote to memory of 2760 1184 f761084.exe 30 PID 1184 wrote to memory of 2760 1184 f761084.exe 30 PID 1184 wrote to memory of 2760 1184 f761084.exe 30 PID 1184 wrote to memory of 2760 1184 f761084.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-19_d2e8e5c5eeac271d22fde03eeccb9053_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761084.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761084.exe 2593957482⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 8283⤵
- Loads dropped DLL
- Program crash
PID:2760
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ed081491c438be6c19f760b80909d653
SHA123978653c8708193b7d4dc50655a483c21b322ad
SHA2565e5bf38a85051794604ff9c0c43c3d3e27c17475c7659168b78fd2ffcc3cd5a2
SHA5121ec73de6ab21b2cc4903cf9678d6af06d16124aa29d2446b6a26d49258b80665c18a1d0d238ac2034396e4779163631979319302ecb89121eb2361f968a6b876