Analysis

  • max time kernel
    91s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 18:55

General

  • Target

    2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    765a12a79fc61c3ef723c95427621198

  • SHA1

    141f1ecfba246fcfa790e7ac0338054366e3c828

  • SHA256

    e5d561aa451829d2c206022efa351d27c0ab2cbd63367715d90d3bf0ffc3ec69

  • SHA512

    5a097012d7a5c6110d9244c8782cf56b9d90df9220a7b56d6c304b9a20946fcc17c092da74b610dba5f6df6430faf8732d1d2ef2da4cec2ae67850cb1262f84f

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nf:DBIKRAGRe5K2UZj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_765a12a79fc61c3ef723c95427621198_hacktools_xiaoba.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57692a.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57692a.exe 240609609
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 2056
        3⤵
        • Program crash
        PID:2280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2964 -ip 2964
    1⤵
      PID:3664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57692a.exe

      Filesize

      3.2MB

      MD5

      921597b299a214b7fc753b9cb33ff1f6

      SHA1

      55cbeff102c8c5a8ea24298234b65005b654a969

      SHA256

      e5a4f249e98549898d80a6dd9c73616431599bd4bc47a0a360ec1ed41ce2d833

      SHA512

      a9feb2852052357dbb1e3b0136d561e1f133c2880f04a2fbcf67227bbb32439bd30e93f79374e76aafa75c5fe7083729dc5194eeb2953e1d9e07c59b49d164fe

    • memory/2964-17-0x00000000761AA000-0x00000000761AB000-memory.dmp

      Filesize

      4KB

    • memory/2964-21-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/3360-0-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/3360-1-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/3360-16-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB