Analysis

  • max time kernel
    37s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 19:00

General

  • Target

    2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    a4e7609f094a107da551b60640e0097e

  • SHA1

    8ab7e13028e799ce4962ca2dd57a944c5c42ae29

  • SHA256

    deb86159685698235019c38fbafbee4053ac8525d1cd0026f7c9e7c983414171

  • SHA512

    9c6b052339eacf640765801d6662eaf6a9611ed54be586414606150627044dcfc16875ca5ccda08ca03cfd8b4f74262f97b3f6f8f42f5fedd4755c66f857d672

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NQ:DBIKRAGRe5K2UZc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-23_a4e7609f094a107da551b60640e0097e_hacktools_xiaoba.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f78a14e.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f78a14e.exe 259563870
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 1468
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f78a14e.exe

    Filesize

    3.2MB

    MD5

    86e741a70c063efecf1687f1eb893865

    SHA1

    d6659e2ee27ef2e97acdd228157d4bb21add9734

    SHA256

    81c98caec01c38475914b6b7a43ee1453e6646914f186ed3c5d9c2577367bb2f

    SHA512

    8ab5a78cfad7beab1e4e04fa7ea7a3bf0466180b422c4ffee69455db81b5fb9709de2d374dd42bb8e6a11c7e9d033aa4bc5c4e669686c335f0ba4c91eacd5b39

  • memory/3004-0-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/3004-1-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/3004-11-0x0000000002770000-0x0000000002B15000-memory.dmp

    Filesize

    3.6MB

  • memory/3004-13-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/3068-12-0x00000000750ED000-0x00000000750EE000-memory.dmp

    Filesize

    4KB

  • memory/3068-42-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/3068-43-0x00000000750ED000-0x00000000750EE000-memory.dmp

    Filesize

    4KB