Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
8addab5319dd66906ba0e9ceb759a09e
-
SHA1
25b264611a8f76840a76392c1c7790f47f4d1c4b
-
SHA256
e19d08069067590812eed72788ef59415858e8f0c813778250cfffaf262c25be
-
SHA512
a431e560e7094a1a1cd7c82c6cf84d2440957ae0eb5cff21f23f726e682b2fbc327779901f17565595c2dcca812eccf4fad60b2912a62228dfd6e0b4db7fca91
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NR:DBIKRAGRe5K2UZV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 f769e23.exe -
Loads dropped DLL 9 IoCs
pid Process 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2572 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f769e23.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 2572 f769e23.exe 2572 f769e23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2572 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 30 PID 2084 wrote to memory of 2572 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 30 PID 2084 wrote to memory of 2572 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 30 PID 2084 wrote to memory of 2572 2084 2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe 30 PID 2572 wrote to memory of 2888 2572 f769e23.exe 32 PID 2572 wrote to memory of 2888 2572 f769e23.exe 32 PID 2572 wrote to memory of 2888 2572 f769e23.exe 32 PID 2572 wrote to memory of 2888 2572 f769e23.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-02_8addab5319dd66906ba0e9ceb759a09e_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769e23.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f769e23.exe 2594319712⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 14603⤵
- Loads dropped DLL
- Program crash
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5d886a71350c77afcdace19a2a8bba500
SHA1430cf0bb81f3bc179821aaa930c4005f9d21b13f
SHA256393b5cc4b11d7e30fdbb54af58fede8519e9b3aeccd9b49edd2027969f476845
SHA512a287707dcf5a1d795ba3d9588eb1063f4647cc8203addfd36381d6285eee158aa1d1c1edcce148399277de8f5c242662664fcfd54f2529ae40db02dfc66242f6