Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
b3298fd648bcf3f28adbcd13ee9dab25
-
SHA1
08490889a0a7883a8f2ef51e79203189d69eaebc
-
SHA256
9e0ef79a4126033c2924c2339093ff680dd5973dc62e21571be6ae2a893b0921
-
SHA512
81751fd2c3b0fe4b884c0773a6f252039062968fd0d9fb423b9260f1d4cbcd9b812ede0a24d08ee7d28ea0223b3f95ebb376058fd75d92bceaefc33c48a5605f
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N1:DBIKRAGRe5K2UZJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 f76f113.exe -
Loads dropped DLL 9 IoCs
pid Process 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2628 1364 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76f113.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 1364 f76f113.exe 1364 f76f113.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1364 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 30 PID 2224 wrote to memory of 1364 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 30 PID 2224 wrote to memory of 1364 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 30 PID 2224 wrote to memory of 1364 2224 2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe 30 PID 1364 wrote to memory of 2628 1364 f76f113.exe 32 PID 1364 wrote to memory of 2628 1364 f76f113.exe 32 PID 1364 wrote to memory of 2628 1364 f76f113.exe 32 PID 1364 wrote to memory of 2628 1364 f76f113.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_b3298fd648bcf3f28adbcd13ee9dab25_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76f113.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76f113.exe 2594532182⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 6083⤵
- Loads dropped DLL
- Program crash
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5e4bf0abffd592a7e506d987802641c12
SHA1f2b536b962677124f8e2bab5944e1f7c7f3c35bb
SHA2565faa7e5ca3b5bc943c254701b0d591558010e60c1e1bcd77380cacd15945b4ee
SHA51274a650cc10940ec97a838567a5f33f052d464860ee9b541c9468f0b886c1c491428d522da0a16a0bb252416ab006aa25bdd4894646a9be30b6c6d91dbd6d8e68