Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
cde50384d4c5a51c2f582b566331d99b
-
SHA1
7b65666abfda593cfa23560ccfef357096e5cdeb
-
SHA256
3ced24ba062d263fb2ce23b67dce56876a803a820e8ed2e56c032db40606351e
-
SHA512
a0306907c485fffbd2879dab2e07181d0ceaea3b950edafd5436b1bdf2b27debb7543c71c77767b496c123f0985fbce7505501032b112e566488fed89830d6f1
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NO:DBIKRAGRe5K2UZy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 956 e57b3a0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3620 956 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1968 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 1968 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 956 e57b3a0.exe 956 e57b3a0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 956 1968 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 81 PID 1968 wrote to memory of 956 1968 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 81 PID 1968 wrote to memory of 956 1968 2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_cde50384d4c5a51c2f582b566331d99b_hacktools_xiaoba.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57b3a0.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57b3a0.exe 2406286562⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 20683⤵
- Program crash
PID:3620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 956 -ip 9561⤵PID:4624
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59de0fdd3ddaeb849e3c9aef22ff49bdf
SHA10a898af914695e41ae4f66a53198071535eb8f49
SHA256f7cb5137176fbc6b51dfdf4067a6ab2e63d1ed4fdbe00d4449730a0a00907f58
SHA5126717f5531a91753f07d071fea2e57e66579b13268a616e0208b9474c5ea58df480fdf355b1aa9a75bebd5a4bdec9e26d47475bccceddb6bef98fa1ef1b1e50f9