Analysis
-
max time kernel
141s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
XunleiDIY1.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XunleiDIY1.1.exe
Resource
win10v2004-20240412-en
General
-
Target
XunleiDIY1.1.exe
-
Size
4.4MB
-
MD5
bd92abd6d5a562b1b178f300556a804a
-
SHA1
240a55267a49f2eae9810566a9f668a5ae0b80ae
-
SHA256
03d445c2b75051cbb00e8348b3c1ef712393cb5f0bc258de5e0eea4d083b4077
-
SHA512
8e867e139d74dfd1bed76489527c4965d491decd06fdd376067bf07245bc271b1a52e46aa38353a50937d6a2af63be6526c48132a94629a1045281ff595f8e73
-
SSDEEP
98304:ed59VT2d2VxRpad6Y7fbSdink7l4ZLyLnCqcKCMesGLU2HlW9PA:i59ViL0afW72ZOLXctrsGLZl8o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4060 is-UVJJS.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4060 4408 XunleiDIY1.1.exe 85 PID 4408 wrote to memory of 4060 4408 XunleiDIY1.1.exe 85 PID 4408 wrote to memory of 4060 4408 XunleiDIY1.1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\XunleiDIY1.1.exe"C:\Users\Admin\AppData\Local\Temp\XunleiDIY1.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\is-HJ54H.tmp\is-UVJJS.tmp"C:\Users\Admin\AppData\Local\Temp\is-HJ54H.tmp\is-UVJJS.tmp" /SL4 $F005C "C:\Users\Admin\AppData\Local\Temp\XunleiDIY1.1.exe" 4359974 522242⤵
- Executes dropped EXE
PID:4060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD55ba571eb89bacef396539841970711b0
SHA1f51e65174a43784710cc2b03a5129f21f3578644
SHA256440f88196d6586d81917097b39bfb98bf338afc24116434de0c25c356e2d7452
SHA512ee46d826d1da230f75ec2e2d96ad1aa918a7f71f530422ee58cc4c50272fce08950eceadd52b103937b36039af44ce1cadeb9d6a1c8eeecdf6e8d07274471a54