Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
765a12a79fc61c3ef723c95427621198
-
SHA1
141f1ecfba246fcfa790e7ac0338054366e3c828
-
SHA256
e5d561aa451829d2c206022efa351d27c0ab2cbd63367715d90d3bf0ffc3ec69
-
SHA512
5a097012d7a5c6110d9244c8782cf56b9d90df9220a7b56d6c304b9a20946fcc17c092da74b610dba5f6df6430faf8732d1d2ef2da4cec2ae67850cb1262f84f
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nf:DBIKRAGRe5K2UZj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 f7680a5.exe -
Loads dropped DLL 9 IoCs
pid Process 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 892 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7680a5.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 892 f7680a5.exe 892 f7680a5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1608 wrote to memory of 892 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 28 PID 1608 wrote to memory of 892 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 28 PID 1608 wrote to memory of 892 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 28 PID 1608 wrote to memory of 892 1608 2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe 28 PID 892 wrote to memory of 2964 892 f7680a5.exe 30 PID 892 wrote to memory of 2964 892 f7680a5.exe 30 PID 892 wrote to memory of 2964 892 f7680a5.exe 30 PID 892 wrote to memory of 2964 892 f7680a5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7680a5.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7680a5.exe 2594244212⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 14763⤵
- Loads dropped DLL
- Program crash
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD53afc711595d7d794baeb6b1d1d70507e
SHA1c3473cdfa3c040de6ed51ee77e47a3f3dd1fd34c
SHA256be002bd430a6a578a1824f88b09b815bd614fe8189322433532866f42744cf74
SHA51223155e0a265173b899b72d378ee78009c8cec88ce85f58cace97abcb207928b5acce3077082c14fbc8d7d50e6232553fca52e689655c30fd5b1a14587b708d28