Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 06:41

General

  • Target

    2024-03-09_1c89b48c7cf873c4dfed148149c5508e_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    1c89b48c7cf873c4dfed148149c5508e

  • SHA1

    913c573dd4df49d49da1befbf41c67a552579f7e

  • SHA256

    5ce5c29924e6db3d039723a08e2881b96d9c01ecf5b52a5a23f1d40d3d4f7bb9

  • SHA512

    984765b336ee567860e144fb0750318444bde0308ab9cf2f759659963468623aa8244983dd8a91e26a0c11cd044b4a8689c751f561745b940ea499095d1a4adf

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nm:DBIKRAGRe5K2UZi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_1c89b48c7cf873c4dfed148149c5508e_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_1c89b48c7cf873c4dfed148149c5508e_hacktools_xiaoba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe 259402190
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 616
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    3.2MB

    MD5

    02f340b60c05333ed60c72b868d26ae4

    SHA1

    c76a83b86fbadc2d948746b4556c669720bb4e57

    SHA256

    6057a916ab58c3481af9797f7c28cf099438e8d2d105532cb3040e5bb1622baf

    SHA512

    6979283eb848a1485aefd305226df264c092764648d9e7668ac6ac8d509146aef3503cac4eba26cd53b372219ec1ba63ee5420af45c90e4f2014761b0d0a8832

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.1MB

    MD5

    b03deac11cd3de19339ac6e833d78f71

    SHA1

    f34295cbefe274e478f99c8000c3bc833f06769e

    SHA256

    d1fe9b5fc1085b4ea767c1e05e5d752e1ac75a3db506f0104479442bbd6ff01f

    SHA512

    ea5d156e32b7bc3fd7d004cc9d87f029cbec89c18e7fe03cfbe831d83125cfc332ef860a6487a34809e6e01610c1eaab45c5af8a03f5890012d699af76b32178

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.3MB

    MD5

    30e3cb9dafba5d40da7ae64fe1289915

    SHA1

    6257043a9868cb7aa92bff6635adf8259752f149

    SHA256

    36bbc2621b5099329a47b24f379587c1b6cd43b39d2b962953a4e191cc4bde01

    SHA512

    63503548d3c600965b81fd546c20d6fcd6b1eb570eed75938c64db836aadc4372fb8cd7ed8ce66644f43a5a04a32f36fd0ac9b7ee3e023bc501467d4de1bf5b0

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.7MB

    MD5

    1ef65755b32b6aff0f06c9fd340c18e6

    SHA1

    0d5ed6d9ee081a2c0ae5e55f27b9ffbc5c0faa81

    SHA256

    8036b2e0d152fae8117c056568e6f11fa497597407a1a1b1446609587fa0cca3

    SHA512

    13a1a3c2e44a024246ac0e9c225e6db20a75116bb7b7c9bad56222dc50006e09506bbcd3454a06cc723a6c851efb36a95177dbd98ed953c19d0917e253a9c843

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.2MB

    MD5

    cd374fed4a413440a62dd9b1e29b3493

    SHA1

    f8ab130d3e0b78e08196e17c33f8351d59c22573

    SHA256

    4cb65b482948ba1e9b835fc341ea569ee0b64e1b2dbf3592fca05c30c8edc23a

    SHA512

    656a1014d367c7e87e7d5e9f7c95d3e763e4fb47b8fbdac7c9fc1d1e98dcddd7870b950a0f7aa2c1ce043f1848fcc543c64269e40c03a08a5ec7179dcdaaa669

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.5MB

    MD5

    007680f629fa1335258b6859f09fdb64

    SHA1

    4442d817834f14e9c673d706affd73e7dec543e1

    SHA256

    a0b242a3a50c514509ebca43dacc23f9849875704fee108f4e457446803226bc

    SHA512

    6636011ab93badc723d14f85f0efb74ebd628a1e9bd1c2b64c6d94d9953e9bacfaac05051b02a31d1eeaf8e45f3d877d36c2296694152c9538b7f1a35a0645ef

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.7MB

    MD5

    f1e88b771b1505b52a7a4f87ea80ad9e

    SHA1

    71d2f21a378f76d1d153908c0061ca8ab3a1de7a

    SHA256

    5b2800f39e36119656ea23b04d2783764949f9e9a2241a166268cc141041729d

    SHA512

    0c65af16689fc3cbe49505e489549e318939bfce40eb06976430ebb9d960d6ec4bb75ade0f0cfda446b64472e268917edd9a97287c84c6cac9027840bceab80a

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7629bf.exe

    Filesize

    2.5MB

    MD5

    c5f65667be93e2d688bc0b6fadf38f2c

    SHA1

    4dfb76f1b39088cc1f96b16e68c948dde88a0b1a

    SHA256

    cd6c6fc1e0122697758315c10bf9504edb97a3b7451dc454e7708ca09f80194b

    SHA512

    9484d189abb2fb63099a11a65995c176d82fe6cf8ac4c0c3f79370067867b960be77bc863a4dc466be1ea06e2c33a94d6664d55d15c0f8875978eac87904e8c6

  • memory/2976-32-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2976-12-0x0000000002C90000-0x0000000003035000-memory.dmp

    Filesize

    3.6MB

  • memory/2976-11-0x0000000002C90000-0x0000000003035000-memory.dmp

    Filesize

    3.6MB

  • memory/2976-1-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/3056-13-0x00000000757B0000-0x00000000758B0000-memory.dmp

    Filesize

    1024KB

  • memory/3056-40-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB