Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
92e2b2b9ffae532a2c2c6a8a5ceb58fc
-
SHA1
f823d25fe8ab4e8b17a3039ab9d8a5342bb76be8
-
SHA256
c02c90a3814b0970c112fd677b84073067b24c460f5d73307a7196066cd7ac0f
-
SHA512
97d0d7d774d0a3798ee3935a4ebea5b0842d5478b515ac18d395366f353c75645a6aaa89d256e1bbdb6bc3455e2b3b878d845cc3dc20bb9dadc83a45dc114f64
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NB:DBIKRAGRe5K2UZ1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
f761a35.exepid process 1184 f761a35.exe -
Loads dropped DLL 9 IoCs
Processes:
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exeWerFault.exepid process 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2492 1184 WerFault.exe f761a35.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exef761a35.exepid process 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe 1184 f761a35.exe 1184 f761a35.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exef761a35.exedescription pid process target process PID 1720 wrote to memory of 1184 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe f761a35.exe PID 1720 wrote to memory of 1184 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe f761a35.exe PID 1720 wrote to memory of 1184 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe f761a35.exe PID 1720 wrote to memory of 1184 1720 2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe f761a35.exe PID 1184 wrote to memory of 2492 1184 f761a35.exe WerFault.exe PID 1184 wrote to memory of 2492 1184 f761a35.exe WerFault.exe PID 1184 wrote to memory of 2492 1184 f761a35.exe WerFault.exe PID 1184 wrote to memory of 2492 1184 f761a35.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_92e2b2b9ffae532a2c2c6a8a5ceb58fc_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761a35.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761a35.exe 2593981972⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 6083⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f761a35.exeFilesize
3.2MB
MD52a5a91f39d76ba54764cfb3c3dd4b412
SHA18f6833826eac12b480a09045a393f7c16ba59b15
SHA25619b47e38cbf4e624e668656e841aed5ff072a7cb7b72d713376ef6652bc418b3
SHA5126eed27dfba2a55788e6aa314d0e3665f55001b9b7f4eeb1b35025744c8be4ebe277717c5ad27cb6b276a41e06b6eae05ca4ffaabf34e32472bcd6845cf7e9463
-
memory/1184-13-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1184-14-0x0000000076C4D000-0x0000000076C4E000-memory.dmpFilesize
4KB
-
memory/1184-44-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1184-45-0x0000000076C4D000-0x0000000076C4E000-memory.dmpFilesize
4KB
-
memory/1720-1-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1720-0-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/1720-12-0x0000000002AF0000-0x0000000002E95000-memory.dmpFilesize
3.6MB
-
memory/1720-11-0x0000000002AF0000-0x0000000002E95000-memory.dmpFilesize
3.6MB
-
memory/1720-34-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB