Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 19:34
Static task
static1
Behavioral task
behavioral1
Sample
?????????????/??????.url
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
?????????????/??????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
1/????.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
1/????.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
1/www.xiaodao.la.exe
Resource
win7-20220414-en
General
-
Target
1/????.exe
-
Size
108KB
-
MD5
4896192ec4694990e55771cb62319761
-
SHA1
13c06c5419936f9afa253935f6cc36f0cd5f918c
-
SHA256
12961fc98232445adc5166ef4b5394f8b0400e3b04aceb4aac481692e222e48b
-
SHA512
bb7057e4530e4f4538809873bfd556a1ffbbb1b2841a93498b43d8ff5c3a98ce0aa3999a9213aaa2f4182cb30f9ee444ccac89015ef841e40e5325736056fd6f
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
www.xiaodao.la.dllpid process 552 www.xiaodao.la.dll -
Suspicious behavior: MapViewOfSection 23 IoCs
Processes:
www.xiaodao.la.dllpid process 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
www.xiaodao.la.dlldescription pid process Token: SeDebugPrivilege 552 www.xiaodao.la.dll -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
www.xiaodao.la.dllpid process 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll 552 www.xiaodao.la.dll -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
____.exewww.xiaodao.la.dlldescription pid process target process PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 308 wrote to memory of 552 308 ____.exe www.xiaodao.la.dll PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 368 552 www.xiaodao.la.dll wininit.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 380 552 www.xiaodao.la.dll csrss.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 416 552 www.xiaodao.la.dll winlogon.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 460 552 www.xiaodao.la.dll services.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 476 552 www.xiaodao.la.dll lsass.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 484 552 www.xiaodao.la.dll lsm.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 580 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 660 552 www.xiaodao.la.dll svchost.exe PID 552 wrote to memory of 736 552 www.xiaodao.la.dll svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1\____.exe"C:\Users\Admin\AppData\Local\Temp\1\____.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1\www.xiaodao.la.dll"www.xiaodao.la.dll"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/308-56-0x000000007EFA0000-0x000000007EFAC000-memory.dmpFilesize
48KB
-
memory/552-54-0x0000000000000000-mapping.dmp
-
memory/552-55-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB
-
memory/552-57-0x0000000002820000-0x00000000028F2000-memory.dmpFilesize
840KB
-
memory/552-58-0x0000000000400000-0x0000000000603000-memory.dmpFilesize
2.0MB
-
memory/552-59-0x0000000000400000-0x0000000000603000-memory.dmpFilesize
2.0MB