Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
58a0cc98e62545f9d23cb8018b34fbf7
-
SHA1
acb2a06d3fcb4fc0a86c37d7b7807c84feca2493
-
SHA256
da48f14b672839432d025cfde78e656be20c0d913fb901b756066288287ab693
-
SHA512
7ad099d5f35e7f77f050904924d74048ac84e2458264a6b89cfae08d5042a285892374a1da2e2bae75853e832b0f3c690f405cfbab05585b91b256cafd1fa4fa
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NV:DBIKRAGRe5K2UZB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 f76ba5a.exe -
Loads dropped DLL 9 IoCs
pid Process 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2488 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76ba5a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 2488 f76ba5a.exe 2488 f76ba5a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2488 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 30 PID 2692 wrote to memory of 2488 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 30 PID 2692 wrote to memory of 2488 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 30 PID 2692 wrote to memory of 2488 2692 2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe 30 PID 2488 wrote to memory of 2736 2488 f76ba5a.exe 32 PID 2488 wrote to memory of 2736 2488 f76ba5a.exe 32 PID 2488 wrote to memory of 2736 2488 f76ba5a.exe 32 PID 2488 wrote to memory of 2736 2488 f76ba5a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-14_58a0cc98e62545f9d23cb8018b34fbf7_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76ba5a.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76ba5a.exe 2594392092⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD538fb04402a269550468186f217686fbc
SHA103719a7bdcfe8094de880b049d8ebdf3d93c39fe
SHA256cf71305aca2e162754fe47aa5c2ddcba1e271847ee9fe37a3a4a8118d1c07e5d
SHA512aa1f3ba297c276bf5806d77c42659619115908166033c9c66c60f1ea2934b11b571ec0f7baa269442af865493db8568c5fdaf012d57cf5db5819ebf703072e96