Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
29388b7c78930fc22a4ae51e7ff294f6
-
SHA1
840c40e4f3f3379c1368c7aabd4efe2b377b2448
-
SHA256
b3244bfb4fb2a9763b84ef400d9e29a09ef4748cc718912c84867417c7df697c
-
SHA512
5c14983053dbcd2df6337f31e54083ba4518c29f79354119064c108939d7bd491f34741329a10891a060e51915c01fa779a473435475442a988861051809f6da
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NN:DBIKRAGRe5K2UZR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 f76b387.exe -
Loads dropped DLL 9 IoCs
pid Process 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2648 1664 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 1664 f76b387.exe 1664 f76b387.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1664 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 30 PID 2404 wrote to memory of 1664 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 30 PID 2404 wrote to memory of 1664 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 30 PID 2404 wrote to memory of 1664 2404 2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe 30 PID 1664 wrote to memory of 2648 1664 f76b387.exe 33 PID 1664 wrote to memory of 2648 1664 f76b387.exe 33 PID 1664 wrote to memory of 2648 1664 f76b387.exe 33 PID 1664 wrote to memory of 2648 1664 f76b387.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_29388b7c78930fc22a4ae51e7ff294f6_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76b387.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76b387.exe 2594374622⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 14483⤵
- Loads dropped DLL
- Program crash
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5aa698194a9df4c9b0958a98f1680d02e
SHA1d5d48788540193dddc42033fa7d1a4c0b9e9a9c1
SHA2567dac507fea64b639ca76d9e456eb2c8abc65340aac39b0b026a4ccda2a55f4f2
SHA512d3c4ba16d5dbe38ed87ed5ea04d448019a6a4d973b4664aeff105fb8f218360b8ab1c63a262a882ddd40972bd7bcf99995b56431695cf443f278947fef9e2dcb