Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe
-
Size
1.1MB
-
MD5
5b42ba6e98f666858277458250eb8e07
-
SHA1
338d5b8834b20f1b9b1e05b880aa2608ab403b16
-
SHA256
35e9a41d67a6ca8b0d21928e4fd972fd604ae6dd76f493e784ea7d7b6a22b94e
-
SHA512
0eb27d825df673f4afb2c24cd38816a2e0a3602269e771fde123a02d1ae8abac94231915d1c27fb8b3732f57270dbfdf95de35da067975736aa9015a7aa57aa4
-
SSDEEP
24576:UfZanlLXYSKEDRWTg+YeP/YkOqLKRbp6MGYor:UPSKRM+Y2ZPLasJ
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 28 IoCs
resource yara_rule behavioral1/memory/2964-1-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-8-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-16-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-20-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-18-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-14-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-12-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-10-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-6-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-4-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-2-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-0-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-22-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-24-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-28-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-31-0x0000000000400000-0x0000000000556000-memory.dmp UPX behavioral1/memory/2964-26-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-30-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-41-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-39-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-43-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-35-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-33-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-37-0x0000000000370000-0x00000000003AE000-memory.dmp UPX behavioral1/memory/2964-44-0x0000000000400000-0x0000000000556000-memory.dmp UPX behavioral1/memory/2964-45-0x0000000000400000-0x0000000000556000-memory.dmp UPX behavioral1/memory/2964-46-0x0000000000400000-0x0000000000556000-memory.dmp UPX behavioral1/memory/2964-47-0x0000000000400000-0x0000000000556000-memory.dmp UPX -
resource yara_rule behavioral1/memory/2964-1-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-8-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-16-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-20-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-18-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-14-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-12-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-10-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-6-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-4-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-2-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-0-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-22-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-24-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-28-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-26-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-30-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-41-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-39-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-43-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-35-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-33-0x0000000000370000-0x00000000003AE000-memory.dmp upx behavioral1/memory/2964-37-0x0000000000370000-0x00000000003AE000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe 2964 2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-04_5b42ba6e98f666858277458250eb8e07_xiaoba.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2964