Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
047da434b2a538d25cc27fdf104f5ddd
-
SHA1
da11a0d94e3199ce59375f944d67c3a48c1cd5d2
-
SHA256
11fd32429fea2095bb3d8f621f1348918adb8bae2a98216667ef4dfbede7f23e
-
SHA512
ce58c84be2eb14eeda63628ede773968a6804ad2e34fed6ffeb527f05adf64e6f5cc919cbffaa633429d338629f15a72bd5b17d446e72d5b908c57c7890d70ec
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NW:DBIKRAGRe5K2UZ6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1604 f768a26.exe -
Loads dropped DLL 9 IoCs
pid Process 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2924 1604 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f768a26.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 1604 f768a26.exe 1604 f768a26.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1604 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 30 PID 2104 wrote to memory of 1604 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 30 PID 2104 wrote to memory of 1604 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 30 PID 2104 wrote to memory of 1604 2104 2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe 30 PID 1604 wrote to memory of 2924 1604 f768a26.exe 32 PID 1604 wrote to memory of 2924 1604 f768a26.exe 32 PID 1604 wrote to memory of 2924 1604 f768a26.exe 32 PID 1604 wrote to memory of 2924 1604 f768a26.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-07_047da434b2a538d25cc27fdf104f5ddd_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768a26.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768a26.exe 2594268702⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ec8e065553e130cd8e8258cd7e4cd7f1
SHA1bd8e783b5e9a2f389392ac1fbfe3453d39fc2d28
SHA256b3bb4010013cb8cd77e21364f75936fe403575646eb264b6d30a730fab671be6
SHA512007c5cb82a16a6b4bd1fd4ceada95c8ed8b741060a0584a02326b21d9e33e1523082336f21a796ee3b420b293a4d932cc013e930a0a8ecf3783809879b9e2220