Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
5b6097c43891ce1db862703206005ca9
-
SHA1
795f3fe2f3136d9a3fc2675bfa1d60f1243c0f16
-
SHA256
971985df1ffb20f23087e02aa628b1416b922235b31dac00f6928a802bc01987
-
SHA512
597fe5346ac398c0b2cb1ab6ac04c8a3613c769c489e90ddd5d8d6ae5e2b4e7f669c523f2027aaa3c5c83816fb6c88c0b4d4ad09f7d941fabd68686c5167f7ed
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N9:DBIKRAGRe5K2UZJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 f76d75b.exe -
Loads dropped DLL 9 IoCs
pid Process 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2916 2408 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76d75b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 2408 f76d75b.exe 2408 f76d75b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2408 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 31 PID 2564 wrote to memory of 2408 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 31 PID 2564 wrote to memory of 2408 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 31 PID 2564 wrote to memory of 2408 2564 2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe 31 PID 2408 wrote to memory of 2916 2408 f76d75b.exe 33 PID 2408 wrote to memory of 2916 2408 f76d75b.exe 33 PID 2408 wrote to memory of 2916 2408 f76d75b.exe 33 PID 2408 wrote to memory of 2916 2408 f76d75b.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_5b6097c43891ce1db862703206005ca9_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76d75b.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76d75b.exe 2594466192⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 14723⤵
- Loads dropped DLL
- Program crash
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59843692eb5461732e8840caeab0e2960
SHA142612063553a51ad75eac4654fd5b4bccdcca75f
SHA256ba2a8c24cc3582f5cc8635a4c0dd228b1180f4e416845e9a019ff39fa532586e
SHA512ab759e5b599679dff8abbb89ff80e1e4d4b5186d8eb2f9e82594d6b5fd577ba304ae2dd01390254cfd12f6cbe49a7f8907f74c2b3a83d4ac62693c32aec98e49