Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
ff92d013e12793767df7cdfa628904d7
-
SHA1
7626619dc1b80c7cd698e952c9d73b06dfe54b51
-
SHA256
bceaa9fd153f70d8cecd19b5d482ab9e22881f3b2b67a06159ac1a88683ab0fd
-
SHA512
e4d280e948e39e94c73aae2341585015a898d3b565ac8f267ebee9932e46462624c3fa508e3ac2ff7e3db9fbe4694ad2678514a9ee46c8858091f85c619693b6
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Ng:DBIKRAGRe5K2UZs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 f76256b.exe -
Loads dropped DLL 9 IoCs
pid Process 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2532 2856 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 f76256b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 f76256b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 2856 f76256b.exe 2856 f76256b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2856 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 28 PID 2616 wrote to memory of 2856 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 28 PID 2616 wrote to memory of 2856 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 28 PID 2616 wrote to memory of 2856 2616 2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe 28 PID 2856 wrote to memory of 2532 2856 f76256b.exe 30 PID 2856 wrote to memory of 2532 2856 f76256b.exe 30 PID 2856 wrote to memory of 2532 2856 f76256b.exe 30 PID 2856 wrote to memory of 2532 2856 f76256b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_ff92d013e12793767df7cdfa628904d7_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76256b.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76256b.exe 2594010672⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD520c02dad7985ebc16ed63ac4aeea765b
SHA1519dcdd3ff56c78a8d4d703b911a95d90acea571
SHA2561bbced0f3acc776b785ac1cb8d1327f525ab6fc9131eea2f66a5f3fb9dc17b54
SHA5124df72041835c3b4a500810015646cf028259a43650687ffcebb5eefb50152beb46438f5747d54149413604aa1180bd3cd3bf3469462210c3b797c3e06a193854
-
Filesize
1.1MB
MD5e074db9801a8630c7ac8f8ddd4aec81c
SHA110685101028e0e62fc3485ddec5b3e99e8967b11
SHA256f9ff9f954844c6ed1978271273f1b13cb3c87a2f6c77da7bf834512b74eabe55
SHA5125633bc940d4308e2a0488ea2cda481e5243a9d91204d26d8dfd7b3f20f071ff5db5b48e5b00b2e7eda2f4484da8e1692e3056a78b3bc838221c5f57b4b870b5f
-
Filesize
1.6MB
MD54aa994a1c08981114a8c6f1f4bcc941d
SHA1276d12a6e167d35afebd7982dd97634717884835
SHA256e6ae12f5e353aad20eccfdec91a6362ac173896657e0274ed894bac69e081a2a
SHA5124a769a55e0b8db014e7d4e4053d358f0a43c1ff5670be61ca450b1108a0deff16194c98cdaafe0eed7eadbce67e4c7e5f1f7daf719ecaffe44f4283ea0eddb08
-
Filesize
438KB
MD51947c10537640c8a2df4a2d4b6d56706
SHA17431d898c34c7ff719ef999fa8f85faab43b0520
SHA256baf44edd197de48e0adf952a6194966c92b6fdcb51e8ff3c7ba3b3e8394ffdc7
SHA51229e807719b6720179b2751b7175201846e45403b3f4f5c02de0a3a3ba6670c05ef8756f967ed75fe27c3b888ca67c0663010a1b2594686cccd98b11a67726e69
-
Filesize
363KB
MD504654190883d8106c513c0c98e553aea
SHA1eba1fd9b7f7dfd380376f2337b5bf1f07c0770ce
SHA2565af0ba962853b0374fe34003bfc8ce95c5a7e3238a78a083026fbe132b77750a
SHA51277b423c5e09e473ead9f2c620ad8bac76d12772903409fa51d0166907060c4d6cc502a46884532cfd629159a54ebe58808f7ab8ed427d24def83ffe902036c33
-
Filesize
288KB
MD5fd93790151d8efa4896f7cd70ed70a96
SHA11070e9b36c5ab44d0835b8cdb5e7c80d36ad6879
SHA25602d59c72818a33a38834a9f1dcec12423494787c36ef17f623bae0898e343060
SHA51214c060fbd29f2981b7702d52026e947afd6b02565be891f5318ae8734a925e65edd50e3386498444c1c21d7f925f59192fa534fcb3b9338cf2d3c41e73f7c8eb
-
Filesize
241KB
MD5477a4ccdddad09e65cd9a7657c23bcdf
SHA1725733b3e0b200907fee5f7971a99d706ff581da
SHA2565f41fe0ca2473b13f327293b6180ec9fe06207bf1ffae56590861229418bf416
SHA512e3f05e986545529338e46dfa45b359ce2dfe21337f729a56f1dc0fd5713e2abfd02f716dc96e82346532c347efe856b6f8aec06dccb6dd1e57242f2d985837d8
-
Filesize
219KB
MD592e28b22465003f0b70236db6f7a9e0b
SHA1ac276fd65c8f98555927bfb1f252af1b94db5179
SHA256c538ace135cafdf2c158263b24059a0832b05fb082ac655e0ed9c1dd2edfc1b4
SHA51292b7451920ecfbdefb2f679aac1107feceb76e3936f7adffbc0cf41be9f58319a569a960c9e4769f2284def22e387e2ec6e627557d07971185c0bd03a305fc40
-
Filesize
154KB
MD5218935f1ff9f4b86949c165b3c2114f1
SHA133471c8ade293c1e0a43fc39c8cc0f347654c60a
SHA25655793dc9b0fb8f2ee8721f51f13132e35f2b46bf731bb3cf3c401a775ae7d918
SHA512dc5add938bddef9072e97341aa3406fb3148862fdb542d3cb5ae1458910d875bacb9ca9bf312402a5bbd0ae3ac0c63b0f42444f7dfb2511e54f6a6a251d13fc7
-
Filesize
1KB
MD556fc8a371408d2eefcec571bc8843f3d
SHA11e554cc5831808539195d5605138e92a6e3954af
SHA256d717db184b364343474f42ef5d9e40c88767b84dc0c0ee7a72e0a134485fd1bf
SHA512f79f6a71cf6da963f0db3ace00f80fc6ea5bca31c5c127606a4b935f90e2373b5204df9c2520015cc2cb3801e4d251ea28c253b78a6a6e8c26a044d7db73d6cb
-
Filesize
1.7MB
MD5be1dfe0a7a9fe675d5b4ffea8a76c08d
SHA1aa19661a3f7f1307d77d4773350138897cdb80cc
SHA25683c5d9d07fac6109ed9e3eea8aca3a600b29a2222bcb765b36b0a8876304fa06
SHA5126fd9fa048f11a856bf3f871d79932c383163d1a606a152fd9c86c549f7da29bbd9c385b8480fba28d424ceeab79b536c97baf60a134edd655410693e3ceb8084