Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
320a4be7efa95f1514a77aa80922d686
-
SHA1
b1b5aca38950972ef265d99bed93703bbbbf0a4d
-
SHA256
6722b2efc38b8767301f2f408b1e41433641571b43b4ef82f8c12e2747f92a86
-
SHA512
3b46979178e8c68808e7add922493b3d61f219eeacd7f21fdcba9aee191c030d08d455f26e34048891f57c2f25ef3525590d1c212c779fb23da39712f1d650d1
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NU:DBIKRAGRe5K2UZI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3044 f768aa3.exe -
Loads dropped DLL 9 IoCs
pid Process 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2624 3044 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f768aa3.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 3044 f768aa3.exe 3044 f768aa3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3044 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 30 PID 2400 wrote to memory of 3044 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 30 PID 2400 wrote to memory of 3044 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 30 PID 2400 wrote to memory of 3044 2400 2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe 30 PID 3044 wrote to memory of 2624 3044 f768aa3.exe 32 PID 3044 wrote to memory of 2624 3044 f768aa3.exe 32 PID 3044 wrote to memory of 2624 3044 f768aa3.exe 32 PID 3044 wrote to memory of 2624 3044 f768aa3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-19_320a4be7efa95f1514a77aa80922d686_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768aa3.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f768aa3.exe 2594270102⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 14603⤵
- Loads dropped DLL
- Program crash
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59708b65e5fecd05256999cc91c8502be
SHA1aca5c9af5c942ca04d3d849a068f09b911d2fbd3
SHA256f6568a605873c0b33c4288cacb3aa1bbd549d3bfa3031fa6472007605e977546
SHA512aaeb2719b1786e0582001241c83d2ecbc5c0c110922b396916f82741b73bb87606963c9aa9f50b363ca6035f023e0db1b3d183db6fd219820ffb5171a824cef6