Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
292b8d44006ea03ea13c8bbe6df33b4c
-
SHA1
8294fbe1da7ea9b0268fdf044a22875e81f58580
-
SHA256
1d7125661486b19a78c8e0142028f037a45d42d6fec26be700b759c7f9eea2e1
-
SHA512
ec5fbbfcc0e6105be80fe2ee1afff555ee785aea27cef48da6f29575502af5186d5918fdd5f5a81d0ffb7f1d00fda2ffb6ce399d7f6ed5ae4a081e486cdaf184
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N7:DBIKRAGRe5K2UZX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 f766384.exe -
Loads dropped DLL 9 IoCs
pid Process 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2492 2024 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 2024 f766384.exe 2024 f766384.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2024 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 28 PID 1200 wrote to memory of 2024 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 28 PID 1200 wrote to memory of 2024 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 28 PID 1200 wrote to memory of 2024 1200 2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe 28 PID 2024 wrote to memory of 2492 2024 f766384.exe 30 PID 2024 wrote to memory of 2492 2024 f766384.exe 30 PID 2024 wrote to memory of 2492 2024 f766384.exe 30 PID 2024 wrote to memory of 2492 2024 f766384.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-25_292b8d44006ea03ea13c8bbe6df33b4c_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f766384.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f766384.exe 2594170572⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:2492
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD583f880074b37827bedea31988a8e3d2b
SHA13dbc4c6a50d333b9098226bcceb924b40375301b
SHA2563850f7b9f1fe3a83f7e7e49bf37e4c18f6f28c84535039c3c41de0a7aa519fab
SHA51251eda4f77b3cdd0bc2a918bdddd4c87ae806108894c3cd5849b1289ba7488e68a1337e8fed2361f2897d118d89bbd71680cf41af2671cff62e685de07754652f