Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
6a752541029d4e6915d907eb562af51f
-
SHA1
ee76abe02b6300241cc91e37575fd9bc23374852
-
SHA256
5bbccdf718790caeef7a06c14c5ab183b6124410978774105c1e0c3e9adae489
-
SHA512
6dae8ed78fe0f36d3a39206d293fad2cd4fa90223cf6fb91f2bcf173e657671d63f0884ecf4967d1be31b0cea3b0e14eb2a5f13c51589c5df90b394121def3ad
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Ni:DBIKRAGRe5K2UZe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 f7610e2.exe -
Loads dropped DLL 9 IoCs
pid Process 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2880 1640 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 1640 f7610e2.exe 1640 f7610e2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1640 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 28 PID 2420 wrote to memory of 1640 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 28 PID 2420 wrote to memory of 1640 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 28 PID 2420 wrote to memory of 1640 2420 2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe 28 PID 1640 wrote to memory of 2880 1640 f7610e2.exe 30 PID 1640 wrote to memory of 2880 1640 f7610e2.exe 30 PID 1640 wrote to memory of 2880 1640 f7610e2.exe 30 PID 1640 wrote to memory of 2880 1640 f7610e2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_6a752541029d4e6915d907eb562af51f_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7610e2.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7610e2.exe 2593958412⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5c211490f9086cfa3ee9f284efa5e9c9b
SHA19f2a6aee2edd443b28c51510c5285e8008a6ffb4
SHA2563216c076bcb62ed2a102dcc916f21371bb9c83a1bb3de4354f7485bd3b7f32eb
SHA512aff265bcda3125e857714d9cb6c9a66fad9a48f5d9b5ec59d3823715dc1a5b8f8e9db6cc9a9e8bb2b642e1203d67dd2f5fcecc39c2030bb582d6015363234dae