Analysis
-
max time kernel
35s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
cde50384d4c5a51c2f582b566331d99b
-
SHA1
7b65666abfda593cfa23560ccfef357096e5cdeb
-
SHA256
3ced24ba062d263fb2ce23b67dce56876a803a820e8ed2e56c032db40606351e
-
SHA512
a0306907c485fffbd2879dab2e07181d0ceaea3b950edafd5436b1bdf2b27debb7543c71c77767b496c123f0985fbce7505501032b112e566488fed89830d6f1
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NO:DBIKRAGRe5K2UZy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2980 f77bd27.exe -
Loads dropped DLL 9 IoCs
pid Process 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2980 WerFault.exe 30 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 2980 f77bd27.exe 2980 f77bd27.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2980 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2980 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2980 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2980 2780 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 30 PID 2980 wrote to memory of 2708 2980 f77bd27.exe 32 PID 2980 wrote to memory of 2708 2980 f77bd27.exe 32 PID 2980 wrote to memory of 2708 2980 f77bd27.exe 32 PID 2980 wrote to memory of 2708 2980 f77bd27.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f77bd27.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f77bd27.exe 2595054632⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 15043⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD53109eaff17e801c0164046ef466ba361
SHA1956f5bcae954561758457529699e6eadf7b3ca0c
SHA256f29b83de5c19e401fec7b9ab39abea1f32b5b0ed40511cd7bfb5800f973f27a2
SHA51241071c546b070cff917ad797ecf68e30b5c55a4be462be2c98823a158f36289512a0529810ca7361df2ff3ade88df9c429ac49fb574b99c618066ffe56842e3b