Analysis

  • max time kernel
    139s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 20:17

General

  • Target

    2024-06-06_cc2b031d1ce509c58ee02c2ce20d71c2_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    cc2b031d1ce509c58ee02c2ce20d71c2

  • SHA1

    c9ac48d386c6e555e08dc8e145d0e57454050d23

  • SHA256

    e7d65d1205e4336949abf492d8c3b49abad76253053d2db4161a6de30b2aa52b

  • SHA512

    75a3e1185a14c365cc07fef7e819fbcc1165aea3ba0ba8ff64ff5e4954398e0a7f788952da0fe3b952fea2bf08f9bc613dca8a3163c8e641d217236f38ad2c9c

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N+:DBIKRAGRe5K2UZi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-06_cc2b031d1ce509c58ee02c2ce20d71c2_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-06_cc2b031d1ce509c58ee02c2ce20d71c2_hacktools_xiaoba.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5772bf.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5772bf.exe 240612031
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2056
        3⤵
        • Program crash
        PID:3632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1860 -ip 1860
    1⤵
      PID:5112

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5772bf.exe

            Filesize

            3.2MB

            MD5

            cd02fa0e88eeb3c1f4c292e686c11d05

            SHA1

            13f231c3e893e65a4778e40990fa69c2fe293372

            SHA256

            9c04127b923c731bc6dd5bc240a26ffd4f6df4a00038faded34a71d083a35c25

            SHA512

            00720f1f06739ffa19cb2f2e64914f46f2ba64076f6ab158cdbcd48c57cf9e64869bc9ab69744c253a8bc44d08e053883f9456c93c2082e243b30ecc433efaba

          • memory/1860-6-0x0000000000400000-0x00000000007A5000-memory.dmp

            Filesize

            3.6MB

          • memory/1860-18-0x0000000076F8A000-0x0000000076F8B000-memory.dmp

            Filesize

            4KB

          • memory/1860-23-0x0000000000400000-0x00000000007A5000-memory.dmp

            Filesize

            3.6MB

          • memory/2964-0-0x0000000000400000-0x00000000007A5000-memory.dmp

            Filesize

            3.6MB

          • memory/2964-22-0x0000000000400000-0x00000000007A5000-memory.dmp

            Filesize

            3.6MB