Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
40accfad4a6c23d4c51c74d18f04c394
-
SHA1
7fde4416a8200d0b4b8a9b46612f034d25f5eb27
-
SHA256
5f2719f35d9cceed68c1eeaf8751a38e5bbb5a25f4e8f7ab8a5e8b07e57cd7e9
-
SHA512
2ea6345b8bcc42d037e48e150c3619b88b5d3dba59c98c38566595a32efcf34432eae2762ad7ed5700a6a0838783af9493b86d675c1ad4ccd6b39fbd27bb99ef
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1NH:DBIKRAGRe5K2UZD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2328 f76cd3e.exe -
Loads dropped DLL 9 IoCs
pid Process 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe 2980 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2980 2328 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76cd3e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 2328 f76cd3e.exe 2328 f76cd3e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2328 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 31 PID 2388 wrote to memory of 2328 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 31 PID 2388 wrote to memory of 2328 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 31 PID 2388 wrote to memory of 2328 2388 2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe 31 PID 2328 wrote to memory of 2980 2328 f76cd3e.exe 33 PID 2328 wrote to memory of 2980 2328 f76cd3e.exe 33 PID 2328 wrote to memory of 2980 2328 f76cd3e.exe 33 PID 2328 wrote to memory of 2980 2328 f76cd3e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_40accfad4a6c23d4c51c74d18f04c394_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76cd3e.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76cd3e.exe 2594440302⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD590e92880d3539219109a21f28ececb6b
SHA181b3be33a7283b692df7950d0c55ab6c3010bd2c
SHA256f853f19409d0f520a35d9730a3cbfd6fb2d825cb1d5cc77a421eeae680047352
SHA51245802d712066c1b503e40b4bd07dd581d1c7642200873fb7d5ec273f5fbf00bbb61764b940204a95d412b39789aaab63341a2c26251cb202df6cd1a209a4153e