Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
8e1287edc06b4ec990bbec75ca6efd40
-
SHA1
3b212e38d16a0124b70ddbc88e9ea193b0c5189a
-
SHA256
f5ee125b85436e12b0dd46a6033944562400c1cb5785fdcf8821f77e987bf5f9
-
SHA512
765227ec2f038ebf3c2b5f62ab829ca3aa65b2577c1378b0e161cc5136e69d4cd9a387b0cf2ce04e02f2dd49677865c2c105772a8a3c0eb26ddda81d0a7eed1b
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N8:DBIKRAGRe5K2UZI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2628 e5853f7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5104 2628 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5853f7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4556 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe 4556 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe 2628 e5853f7.exe 2628 e5853f7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2628 4556 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe 92 PID 4556 wrote to memory of 2628 4556 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe 92 PID 4556 wrote to memory of 2628 4556 2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_8e1287edc06b4ec990bbec75ca6efd40_hacktools_xiaoba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5853f7.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e5853f7.exe 2406697032⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 20563⤵
- Program crash
PID:5104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2628 -ip 26281⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5571c52618af22ad97d2f5f29b2e02b5a
SHA141c86a16e0a5c93628fcd44a9e946ecfa8d7ce23
SHA256bb3dd4f5dd68b5d3286fa53de0bac572a7273af1db9c30de7ed1464f47168206
SHA5128d3b9850638f55b6dbd5d0c1463bcf917a5e656350da55ad75942f124650f96457c239e29dccff00d63029f68c0adb408b373a951cee9d4da33424f144a82d20