Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
316b789daf9c9c19dc2321b36e0187e7
-
SHA1
d859a67160dbd7c5336651f6075dd204b9d523ae
-
SHA256
d3a28df6527c14420eb1e62b045ba72a3ee1bb0e66f2bd3cb509ebb0fa000171
-
SHA512
cde5752333bab7d773d1e55e957762aa010fdf6a7a6050e1d844817646c419d7ede13c6882cb1970c0314a9b505c8a37861972ea33ecf6c9770f5eff44c3e88d
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NG:DBIKRAGRe5K2UZy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2072 f779a9a.exe -
Loads dropped DLL 9 IoCs
pid Process 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2568 2072 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f779a9a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 2072 f779a9a.exe 2072 f779a9a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2072 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 30 PID 1284 wrote to memory of 2072 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 30 PID 1284 wrote to memory of 2072 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 30 PID 1284 wrote to memory of 2072 1284 2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe 30 PID 2072 wrote to memory of 2568 2072 f779a9a.exe 32 PID 2072 wrote to memory of 2568 2072 f779a9a.exe 32 PID 2072 wrote to memory of 2568 2072 f779a9a.exe 32 PID 2072 wrote to memory of 2568 2072 f779a9a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_316b789daf9c9c19dc2321b36e0187e7_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f779a9a.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f779a9a.exe 2594966182⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 14803⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5b2ab40f308ce2513dbddc24d3f79c68b
SHA1aae416851c40b756b685ad486b2fbcad5b2da19e
SHA256d13ef548055abd2e740febf27ff61af92d1380f42471bbc3af764cb22581bc7d
SHA512e6c1de6a3ebcd0c816aa47becd0d7460e5b8e892a7491c53a222fd98b29ef36fa49e51279155dc87b31d6624c58a7619b7b38b42d37d09d18209813d26ed259f