Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 15:38
Static task
static1
Behavioral task
behavioral1
Sample
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe
-
Size
716KB
-
MD5
980c6495b5be689bd08ca90360eca8c3
-
SHA1
31bc8d269709b93f3cb3f43494f916fd7c1390e5
-
SHA256
1acdd1c18009ee16bea0c9d64f6b63b1243449531384a4265e1ef9cc66439466
-
SHA512
013b399a86c77012b72419fca54f78a51556f84bba3589a2f6e5ad73746732b2e4570ba0c0209688df173830e85b57d2a0851ac535aa07b68dbf47cfeda1fa2c
-
SSDEEP
12288:BaPVmPWz9Ms99bJ9RQ8gzl8c1osWoZ+v6b+w:Bfuzis9hxolDasWoZxb+w
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe -
Runs net.exe
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2500 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2772 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 28 PID 2604 wrote to memory of 2772 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 28 PID 2604 wrote to memory of 2772 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 28 PID 2604 wrote to memory of 2772 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 28 PID 2772 wrote to memory of 2180 2772 cmd.exe 30 PID 2772 wrote to memory of 2180 2772 cmd.exe 30 PID 2772 wrote to memory of 2180 2772 cmd.exe 30 PID 2772 wrote to memory of 2180 2772 cmd.exe 30 PID 2180 wrote to memory of 2272 2180 net.exe 31 PID 2180 wrote to memory of 2272 2180 net.exe 31 PID 2180 wrote to memory of 2272 2180 net.exe 31 PID 2180 wrote to memory of 2272 2180 net.exe 31 PID 2604 wrote to memory of 2356 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 32 PID 2604 wrote to memory of 2356 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 32 PID 2604 wrote to memory of 2356 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 32 PID 2604 wrote to memory of 2356 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 32 PID 2604 wrote to memory of 2500 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 34 PID 2604 wrote to memory of 2500 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 34 PID 2604 wrote to memory of 2500 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 34 PID 2604 wrote to memory of 2500 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 34 PID 2604 wrote to memory of 2436 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 36 PID 2604 wrote to memory of 2436 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 36 PID 2604 wrote to memory of 2436 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 36 PID 2604 wrote to memory of 2436 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 36 PID 2604 wrote to memory of 2440 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 38 PID 2604 wrote to memory of 2440 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 38 PID 2604 wrote to memory of 2440 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 38 PID 2604 wrote to memory of 2440 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 38 PID 2604 wrote to memory of 2832 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 40 PID 2604 wrote to memory of 2832 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 40 PID 2604 wrote to memory of 2832 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 40 PID 2604 wrote to memory of 2832 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 40 PID 2604 wrote to memory of 2896 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 42 PID 2604 wrote to memory of 2896 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 42 PID 2604 wrote to memory of 2896 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 42 PID 2604 wrote to memory of 2896 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 42 PID 2604 wrote to memory of 2888 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 44 PID 2604 wrote to memory of 2888 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 44 PID 2604 wrote to memory of 2888 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 44 PID 2604 wrote to memory of 2888 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 44 PID 2604 wrote to memory of 2812 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 46 PID 2604 wrote to memory of 2812 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 46 PID 2604 wrote to memory of 2812 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 46 PID 2604 wrote to memory of 2812 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 46 PID 2604 wrote to memory of 2696 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 48 PID 2604 wrote to memory of 2696 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 48 PID 2604 wrote to memory of 2696 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 48 PID 2604 wrote to memory of 2696 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 48 PID 2604 wrote to memory of 1984 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 50 PID 2604 wrote to memory of 1984 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 50 PID 2604 wrote to memory of 1984 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 50 PID 2604 wrote to memory of 1984 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 50 PID 2604 wrote to memory of 2704 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 52 PID 2604 wrote to memory of 2704 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 52 PID 2604 wrote to memory of 2704 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 52 PID 2604 wrote to memory of 2704 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 52 PID 2604 wrote to memory of 2760 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 54 PID 2604 wrote to memory of 2760 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 54 PID 2604 wrote to memory of 2760 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 54 PID 2604 wrote to memory of 2760 2604 980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe"C:\Users\Admin\AppData\Local\Temp\980c6495b5be689bd08ca90360eca8c3_xiaoba_JC.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c net user %username% san0109112⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net.exenet user Admin san0109113⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin san0109114⤵PID:2272
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cd C:\Users\%username%\Desktop2⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.exe *.exe.yyds2⤵
- Suspicious behavior: RenamesItself
PID:2500
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.com *.com.yyds2⤵PID:2436
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.scr *.scr.yyds2⤵PID:2440
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.txt *.txt.yyds2⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.bat *.bat.yyds2⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.cmd *.cmd.yyds2⤵PID:2888
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.lnk *.lnk.yyds2⤵PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.jpeg *.jpeg.yyds2⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.jpg *.jpg.yyds2⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.png *.png.yyds2⤵PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c ren *.ico *.ico.yyds2⤵PID:2760
-