Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
4e08585553fe8f4541e9661068aae24d
-
SHA1
cfb6a5a4b48819051e53222c5b4c9e8d882fd6e4
-
SHA256
6119e2f38e6a3158a9085d3009afc5e5d5b8af00b37566ab801472e639a9df76
-
SHA512
8e43ca702c1eab05006c8daebf2ffd1429825cf7efecb651ed442b85be9184a5d1b0b377fb6a20ecc751ec1e87965197ae020e5ffb41d4777a46070c50204db3
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nq:DBIKRAGRe5K2UZW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 f769147.exe -
Loads dropped DLL 9 IoCs
pid Process 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2932 1720 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f769147.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 1720 f769147.exe 1720 f769147.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1720 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 30 PID 2416 wrote to memory of 1720 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 30 PID 2416 wrote to memory of 1720 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 30 PID 2416 wrote to memory of 1720 2416 2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe 30 PID 1720 wrote to memory of 2932 1720 f769147.exe 32 PID 1720 wrote to memory of 2932 1720 f769147.exe 32 PID 1720 wrote to memory of 2932 1720 f769147.exe 32 PID 1720 wrote to memory of 2932 1720 f769147.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-18_4e08585553fe8f4541e9661068aae24d_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769147.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769147.exe 2594286792⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD553cc36e6e6f1a4748698c88b399aca35
SHA1e192fa5019e5ca91f5e49f2b3d75d31bb0ea0d56
SHA256eb0374ac0729c3f6d2168e7c4aa9965467e1cc98842d5e11e8129036bdc3ea03
SHA51225f58c376514a262219e1ec2fea6bb6f4a5d35935f9f6e203f5cec7f7df07a410528281717e1990cf6979853fb64393a7cbd7aca04532ace62284bf4c7fc049a