Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
97ddd4e9980552ab47415b851518fd92
-
SHA1
9ccaf5736000af9a60eebbc74444dd4883e5ddfa
-
SHA256
0adb1953bd10e62e72405141fa6a90be2b889dd44de47df5c7170c08fa2d8ed3
-
SHA512
f0d055ae936280facf40c99bc80d2ace7c2b4ae8b90d757ca42df13bb46d2758085d0596053f2a76c4cdad322be12f1058343ecf9ff52e0d6f8e8017a8374dbc
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NA:DBIKRAGRe5K2UZc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 f7684ba.exe -
Loads dropped DLL 9 IoCs
pid Process 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2444 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7684ba.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 2444 f7684ba.exe 2444 f7684ba.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2444 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 28 PID 2296 wrote to memory of 2444 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 28 PID 2296 wrote to memory of 2444 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 28 PID 2296 wrote to memory of 2444 2296 2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe 28 PID 2444 wrote to memory of 2688 2444 f7684ba.exe 30 PID 2444 wrote to memory of 2688 2444 f7684ba.exe 30 PID 2444 wrote to memory of 2688 2444 f7684ba.exe 30 PID 2444 wrote to memory of 2688 2444 f7684ba.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-17_97ddd4e9980552ab47415b851518fd92_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7684ba.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7684ba.exe 2594254812⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 14483⤵
- Loads dropped DLL
- Program crash
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD57ca4a090d726d2b1235a9a11f206b509
SHA1605d5da844ac1491add7da7e2295f0cf706f83f7
SHA256c0ecf54a24757a54b161370690b5fde3d65612ff8d93536dd8fee00cfa0e1e1f
SHA512f73fb2170f1569b033d2a1aa44c83bcf8daf296f8540287f0204e72bf3827f892cbe5c1791e352ec54b193333052f21604abf87cc59a27626fe261c7c69e8f4c