Analysis

  • max time kernel
    146s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 05:55

General

  • Target

    2024-01-10_bc73a96393bc27f05c7015066c49ff6b_xiaoba.exe

  • Size

    672KB

  • MD5

    bc73a96393bc27f05c7015066c49ff6b

  • SHA1

    effa430658352cb4093ce5af995746cd151d45ad

  • SHA256

    7fe24e1e0498fff45cf8360ed9ac11f838e02f1f5246f6fb21508c7af4140417

  • SHA512

    5a17d53c5efdfa25ee01637059be17098f9d57357419857c0334b5f8a67eeeeb5ce212989f6879061b8f4aac1558837b07c9273d1f62ed2497f21f5a9d9c1bd5

  • SSDEEP

    12288:fAipPYCmrZbJuZ6b7Z4N6cmBPuNk4Azy22f222fE2f22222fdf222ZN+u1xLTKZc:fAipPYCmrZbJG6b7Z4YcmBPua4122f2/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_bc73a96393bc27f05c7015066c49ff6b_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_bc73a96393bc27f05c7015066c49ff6b_xiaoba.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads