Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
b84874b959a3d3b3bad6091990c9c846
-
SHA1
3f99be85e721de750a5af1165166a4042811447b
-
SHA256
8ad9ee1c55b53bafaee4f6dc13fa2d81673c6730020a6727d3863de79d6f7050
-
SHA512
5450e39bbe662831567e81982a447704436ada7cb6566b69bdd2f66e86ae95f0f80059fbbc269f4126e553d4f9040f7ae0a2d09c6144b84ec9f4e7ec2e3769ae
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N3:DBIKRAGRe5K2UZz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 f777ef0.exe -
Loads dropped DLL 9 IoCs
pid Process 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 1744 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f777ef0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 1744 f777ef0.exe 1744 f777ef0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 468 wrote to memory of 1744 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 30 PID 468 wrote to memory of 1744 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 30 PID 468 wrote to memory of 1744 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 30 PID 468 wrote to memory of 1744 468 2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe 30 PID 1744 wrote to memory of 2688 1744 f777ef0.exe 32 PID 1744 wrote to memory of 2688 1744 f777ef0.exe 32 PID 1744 wrote to memory of 2688 1744 f777ef0.exe 32 PID 1744 wrote to memory of 2688 1744 f777ef0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f777ef0.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f777ef0.exe 2594895822⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ba720da40dec70af3855796bf9e4e51c
SHA14c423bf230aa7f7e6ee9c6d1eac65754dba63df7
SHA2569cd789a162b1a913246f2f4c5512730ef74a73b25d180a6907f9a1774fcbab08
SHA512162af98e5c5324e3e221e89e25a3107aa4ce64c0dfd6605051f84f89f650e7cc583483beb1d5b054a9b6f4ecf4046a8fc71f3772fdde1b3a2706de86e232b0d7