Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
2612ed8439238d0491c12a2331631505
-
SHA1
532cdfa610a032b48937a7ff94b93d6ae3ee8555
-
SHA256
3b6351604e9ec0eeca77e1e4a262491b3a41232c4ff496c80b7b4a04840f6db6
-
SHA512
b72e2b1dfede897c710c1163cd61a55692d3a57bce725fbc676c29395af93b21800aa9301d2a2241a71f821704cf878ea30120f14c21735ee87607ddc9df9f9b
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nz:DBIKRAGRe5K2UZ3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 f768095.exe -
Loads dropped DLL 9 IoCs
pid Process 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2428 2744 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 2744 f768095.exe 2744 f768095.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2744 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 28 PID 2656 wrote to memory of 2744 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 28 PID 2656 wrote to memory of 2744 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 28 PID 2656 wrote to memory of 2744 2656 2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe 28 PID 2744 wrote to memory of 2428 2744 f768095.exe 30 PID 2744 wrote to memory of 2428 2744 f768095.exe 30 PID 2744 wrote to memory of 2428 2744 f768095.exe 30 PID 2744 wrote to memory of 2428 2744 f768095.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_2612ed8439238d0491c12a2331631505_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768095.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768095.exe 2594244212⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 5803⤵
- Loads dropped DLL
- Program crash
PID:2428
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5968f6ccc95cc9e500ee23169c88e0924
SHA1a77d6c85231d5790092288bf1d6305f05b07802b
SHA25604bd284320a7912e5c412a084ba47a98e1a01eb1805f1157952f80905c6cc779
SHA512ac92283e2e77018b4b7662b9db0991135987f71254b2b2bcc2ed8c75f790760e14c50da3e076c25fadf90d430782866230598666c687e59718f0a29cbe438155