Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 19:03

General

  • Target

    2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe

  • Size

    3.2MB

  • MD5

    b84874b959a3d3b3bad6091990c9c846

  • SHA1

    3f99be85e721de750a5af1165166a4042811447b

  • SHA256

    8ad9ee1c55b53bafaee4f6dc13fa2d81673c6730020a6727d3863de79d6f7050

  • SHA512

    5450e39bbe662831567e81982a447704436ada7cb6566b69bdd2f66e86ae95f0f80059fbbc269f4126e553d4f9040f7ae0a2d09c6144b84ec9f4e7ec2e3769ae

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1N3:DBIKRAGRe5K2UZz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_b84874b959a3d3b3bad6091990c9c846_hacktools_xiaoba.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57661c.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57661c.exe 240608796
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 2072
        3⤵
        • Program crash
        PID:2428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3780 -ip 3780
    1⤵
      PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e57661c.exe

      Filesize

      3.2MB

      MD5

      4e8b7c9acfc1911891faee4d9186b15f

      SHA1

      2f6e812ab13e19327a280fe53cebe2201d3d1c11

      SHA256

      8f7bd43cba5971a46871da216852277e8dc36a7fa5db286f3fef54e401bc9a1f

      SHA512

      ac49342b340df08d5f014f6f818149e74c4425ebc58a414defeb7d5869ab27b6ab71b89a95196ecada20ac46b6501444e1df8c542d9f1155fb6645732e6cf8e9

    • memory/2756-0-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/2756-1-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/2756-16-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB

    • memory/3780-17-0x000000007730A000-0x000000007730B000-memory.dmp

      Filesize

      4KB

    • memory/3780-21-0x0000000000400000-0x00000000007A5000-memory.dmp

      Filesize

      3.6MB