Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe
-
Size
3.2MB
-
MD5
2143c310d30cb49b4b64c5af4d06977c
-
SHA1
5a7416c92050171d044344b42435172da4b8192c
-
SHA256
4d10fe1de30ac9ba8571be14db1ca79c5c12857fb88ef9661fcefb172d771318
-
SHA512
6128d4e831e83a7c4f0e327364ef349e316d5ba45e514b9e0e55573ede1e32a919afacb98c1fa9a6646e7ec96556c6a12dca88da1154a4d1165670d258cbc046
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Nw:DBIKRAGRe5K2UZM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 f76b9dd.exe -
Loads dropped DLL 9 IoCs
pid Process 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1644 1988 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76b9dd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 1988 f76b9dd.exe 1988 f76b9dd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1988 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 30 PID 1724 wrote to memory of 1988 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 30 PID 1724 wrote to memory of 1988 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 30 PID 1724 wrote to memory of 1988 1724 2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe 30 PID 1988 wrote to memory of 1644 1988 f76b9dd.exe 33 PID 1988 wrote to memory of 1644 1988 f76b9dd.exe 33 PID 1988 wrote to memory of 1644 1988 f76b9dd.exe 33 PID 1988 wrote to memory of 1644 1988 f76b9dd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_2143c310d30cb49b4b64c5af4d06977c_hacktools_xiaoba.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76b9dd.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76b9dd.exe 2594390692⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5a9f12034793444d21c5f0229f4580695
SHA1a2eafbf3dcfb05ce078c4a0dd54d40513477df62
SHA2563667d085fbdbf0362659d942431aab9b98fe05d7bc27d719104f8619bd6dc9e4
SHA51252512793ebb298b87458c0f31ba042813c4599f90fe6a0d37ae4fdc4036f4779240069de4b65f4651abe319d5d05ac8bf897c86738cfad5f40ee599e373d10b4