Analysis
-
max time kernel
40s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
29ef68b78e9ca456fc42c800cc2c5a99
-
SHA1
e23f23ab8c9ed6dc1168cc3e8ca12b11cc8643ed
-
SHA256
e623d4f88caa0f28c9402e64e227ebb0ff30daa0dffb737f9fd3ecadc456c771
-
SHA512
840267ac3779426bf2d701e599b4ed50e4ddfc2041d388c5321b7cc356f0106fbc9dbba50844e5d92669e39f3077dd50922d6b8616a2b9840eef330195571afd
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NV:DBIKRAGRe5K2UZx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 f77b6a2.exe -
Loads dropped DLL 9 IoCs
pid Process 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2524 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77b6a2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 2524 f77b6a2.exe 2524 f77b6a2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2524 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2524 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2524 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 30 PID 2780 wrote to memory of 2524 2780 2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe 30 PID 2524 wrote to memory of 2692 2524 f77b6a2.exe 32 PID 2524 wrote to memory of 2692 2524 f77b6a2.exe 32 PID 2524 wrote to memory of 2692 2524 f77b6a2.exe 32 PID 2524 wrote to memory of 2692 2524 f77b6a2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-18_29ef68b78e9ca456fc42c800cc2c5a99_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f77b6a2.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f77b6a2.exe 2595038092⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 5963⤵
- Loads dropped DLL
- Program crash
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5894388247c62957bf8390ffaf2092006
SHA1491bebf0732256ef78131680b3073f08bc338624
SHA2568f66f071cd1ca3683ff8257a90725f3c10fe84c1d51e308c317621f6eb8ee568
SHA51247f427db22acfb75171055bec724e57bdd55006fbee2ed7f88081b0bfc684ac5c86934dcaed5ba8852394ce4c5749afb04d114def6cc158cb6ddfd55116d7ca8