Analysis
-
max time kernel
97s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
5e75adb444ab8edad51ca9e620a44725
-
SHA1
29c7376f5081fdb6e27205fbc2b3790333d8a1b7
-
SHA256
5fe4f64893d3ff2a595794abd371489795a8c8c246d8c48d6f6852efba0adf2d
-
SHA512
71abe9e4e8808b11314b98b5266d5409b7ec242a8ee803f5522c2b61240ce6217f81c758096306ebed324bdbf9d1fa8e130233dac1c92bec8f711c5eee4ac1dc
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NS:DBIKRAGRe5K2UZW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 e579172.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2620 1356 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e579172.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4644 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe 4644 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe 1356 e579172.exe 1356 e579172.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1356 4644 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe 84 PID 4644 wrote to memory of 1356 4644 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe 84 PID 4644 wrote to memory of 1356 4644 2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-08_5e75adb444ab8edad51ca9e620a44725_hacktools_xiaoba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e579172.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\e579172.exe 2406200002⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 20723⤵
- Program crash
PID:2620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1356 -ip 13561⤵PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ac8ea85ae72220ef06d4cd999b5ff030
SHA160e636a8c0dc505f0ec697090c8fcc839158dfbd
SHA256e486ef166ebfa9e6f09cda8ea7f1b3e34b6157b5eb4c049124efdad6bb7b5f22
SHA5127b23673583db95eafc676d7ee52f96ceccfac8a6566bd9185d3a34562374a7fde9fc0e062c0e8aedb135879e3b43de5d27a9c33186aed5831ba4344839cb9f78