Analysis
-
max time kernel
81s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe
-
Size
3.2MB
-
MD5
1c71353788f777df6b1fdff553d383f8
-
SHA1
c23f2a012c6239801bdf8ffabb514c4dbe801ab4
-
SHA256
26c21397b627e21fa7b1d2bacd96b3d3e426fc7d5468830c8c6b769ad59b0ecc
-
SHA512
13c8930dca345f952a62e64a862a1ad35df0a1eb16791676fcdbfca7f681fe1063e04c0bc7335c9e39d790cada1470d3ce3356fd9ddcb0301de59c4e85861c21
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NJ:DBIKRAGRe5K2UZV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 e57ed00.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3456 976 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3344 1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe 3344 1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe 976 e57ed00.exe 976 e57ed00.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 976 3344 1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe 82 PID 3344 wrote to memory of 976 3344 1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe 82 PID 3344 wrote to memory of 976 3344 1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe"C:\Users\Admin\AppData\Local\Temp\1c71353788f777df6b1fdff553d383f8_hacktools_xiaoba_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57ed00.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57ed00.exe 2406433432⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 19203⤵
- Program crash
PID:3456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 976 -ip 9761⤵PID:2696
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5c720ee4f46d85fb94a298bad1332831c
SHA1ad64eb673e80aabb2805dd83f6c2756af8506ea4
SHA25619b7fdf790a2850a9791b1bc98932e8bac08f6b8199a0bec93c0f18ce249ebf3
SHA51275f96138f8e2d92cc30643fc51f1a85e6110c13ee4c505e25dcae9338313eee54d0c31f0703772171a031a22dbf41065e239d24411a6ad527ded0c43674a5f94
-
Filesize
3.2MB
MD5c720ee4f46d85fb94a298bad1332831c
SHA1ad64eb673e80aabb2805dd83f6c2756af8506ea4
SHA25619b7fdf790a2850a9791b1bc98932e8bac08f6b8199a0bec93c0f18ce249ebf3
SHA51275f96138f8e2d92cc30643fc51f1a85e6110c13ee4c505e25dcae9338313eee54d0c31f0703772171a031a22dbf41065e239d24411a6ad527ded0c43674a5f94