Analysis
-
max time kernel
37s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
a4e7609f094a107da551b60640e0097e
-
SHA1
8ab7e13028e799ce4962ca2dd57a944c5c42ae29
-
SHA256
deb86159685698235019c38fbafbee4053ac8525d1cd0026f7c9e7c983414171
-
SHA512
9c6b052339eacf640765801d6662eaf6a9611ed54be586414606150627044dcfc16875ca5ccda08ca03cfd8b4f74262f97b3f6f8f42f5fedd4755c66f857d672
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NQ:DBIKRAGRe5K2UZc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 f78a14e.exe -
Loads dropped DLL 9 IoCs
pid Process 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2240 3068 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78a14e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 3068 f78a14e.exe 3068 f78a14e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3068 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 29 PID 3004 wrote to memory of 3068 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 29 PID 3004 wrote to memory of 3068 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 29 PID 3004 wrote to memory of 3068 3004 2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe 29 PID 3068 wrote to memory of 2240 3068 f78a14e.exe 31 PID 3068 wrote to memory of 2240 3068 f78a14e.exe 31 PID 3068 wrote to memory of 2240 3068 f78a14e.exe 31 PID 3068 wrote to memory of 2240 3068 f78a14e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f78a14e.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f78a14e.exe 2595638702⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 14683⤵
- Loads dropped DLL
- Program crash
PID:2240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD586e741a70c063efecf1687f1eb893865
SHA1d6659e2ee27ef2e97acdd228157d4bb21add9734
SHA25681c98caec01c38475914b6b7a43ee1453e6646914f186ed3c5d9c2577367bb2f
SHA5128ab5a78cfad7beab1e4e04fa7ea7a3bf0466180b422c4ffee69455db81b5fb9709de2d374dd42bb8e6a11c7e9d033aa4bc5c4e669686c335f0ba4c91eacd5b39