Malware Analysis Report

2024-10-10 07:17

Sample ID 240611-1l9gmashma
Target Xiaomi_Pro_Tool_v3.8.rar
SHA256 9c13cde9c884d4632662fc108d67a11740e75897f227d7b438294d8b20871396
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

9c13cde9c884d4632662fc108d67a11740e75897f227d7b438294d8b20871396

Threat Level: Shows suspicious behavior

The file Xiaomi_Pro_Tool_v3.8.rar was found to be: Shows suspicious behavior.

Malicious Activity Summary


Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-11 21:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:46

Platform

debian9-mipsel-20240226-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

53s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8.rar

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8.rar

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

debian12-armhf-20240418-en

Max time network

145s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
US 1.1.1.1:53 debian12-armhf-20240418-en-13 udp
US 1.1.1.1:53 debian12-armhf-20240418-en-13 udp
US 1.1.1.1:53 debian12-armhf-20240418-en-13 udp
US 1.1.1.1:53 debian12-armhf-20240418-en-13 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

macos-20240611-en

Max time kernel

150s

Max time network

154s

Command Line

[sh -c sudo /bin/zsh -c "/Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin"]

Signatures

N/A

Processes

/bin/sh

[sh -c sudo /bin/zsh -c "/Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin"]

/bin/bash

[sh -c sudo /bin/zsh -c "/Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin"]

/usr/bin/sudo

[sudo /bin/zsh -c /Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin]

/bin/zsh

[/bin/zsh -c /Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin]

/Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin

[/Users/run/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/gpt_main0.bin]

/usr/libexec/xpcproxy

[xpcproxy com.apple.secinitd]

/usr/libexec/secinitd

[/usr/libexec/secinitd]

/usr/libexec/xpcproxy

[xpcproxy com.apple.geod]

/System/Library/PrivateFrameworks/GeoServices.framework/Versions/A/XPCServices/com.apple.geod.xpc/Contents/MacOS/com.apple.geod

[/System/Library/PrivateFrameworks/GeoServices.framework/Versions/A/XPCServices/com.apple.geod.xpc/Contents/MacOS/com.apple.geod]

/usr/libexec/xpcproxy

[xpcproxy com.apple.routined]

/usr/libexec/routined

[/usr/libexec/routined LAUNCHED_BY_LAUNCHD]

/usr/libexec/xpcproxy

[xpcproxy com.apple.Maps.mapspushd]

/System/Library/CoreServices/mapspushd

[/System/Library/CoreServices/mapspushd]

/usr/libexec/xpcproxy

[xpcproxy com.apple.nehelper]

/usr/libexec/nehelper

[/usr/libexec/nehelper]

/usr/libexec/xpcproxy

[xpcproxy com.apple.neagent.878568F8-CCE5-4157-8315-22F20DC8FB0A]

/usr/libexec/neagent

[/usr/libexec/neagent]

/usr/sbin/spctl

[/usr/sbin/spctl --assess --type execute /Applications/OneDrive.app]

/usr/libexec/xpcproxy

[xpcproxy com.apple.bird]

/usr/libexec/xpcproxy

[xpcproxy com.apple.dmd]

/usr/libexec/dmd

[/usr/libexec/dmd]

/System/Library/PrivateFrameworks/CloudDocsDaemon.framework/Versions/A/Support/bird

[/System/Library/PrivateFrameworks/CloudDocsDaemon.framework/Versions/A/Support/bird]

/usr/libexec/xpcproxy

[xpcproxy com.apple.pbs]

/System/Library/CoreServices/pbs

[/System/Library/CoreServices/pbs]

/bin/launchctl

[/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon]

/bin/launchctl

[/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon]

/usr/libexec/xpcproxy

[xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E]

/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService

[/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService]

Network

Country Destination Domain Proto
US 52.182.143.213:443 tcp
US 8.8.8.8:53 h3.apis.apple.map.fastly.net udp
GB 17.250.81.65:443 tcp
US 8.8.8.8:53 a1366.dscapi6.akamai.net udp
GB 23.59.171.27:443 a1366.dscapi6.akamai.net tcp
US 8.8.8.8:53 e4686.dsce9.akamaiedge.net udp
GB 23.59.171.16:443 a1366.dscapi6.akamai.net tcp
US 8.8.8.8:53 a479.dscg4.akamai.net udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 mobile.events.data.trafficmanager.net udp
US 52.182.143.215:443 tcp
US 8.8.8.8:53 cds.apple.com udp
BE 104.68.86.71:443 cds.apple.com tcp
US 8.8.8.8:53 help.apple.com udp
SE 23.34.233.79:443 help.apple.com tcp
SE 23.34.233.79:443 help.apple.com tcp

Files

/var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/C//mds/mdsObject.db

MD5 d3a1859e6ec593505cc882e6def48fc8
SHA1 f8e6728e3e9de477a75706faa95cead9ce13cb32
SHA256 3ebafa97782204a4a1d75cfec22e15fcdeab45b65bab3b3e65508707e034a16c
SHA512 ea2a749b105759ea33408186b417359deffb4a3a5ed0533cb26b459c16bb3524d67ede5c9cf0d5098921c0c0a9313fb9c2672f1e5ba48810eda548fa3209e818

/var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/C//mds/mdsDirectory.db

MD5 0e4a0d1ceb2af6f0f8d0167ce77be2d3
SHA1 414ba4c1dc5fc8bf53d550e296fd6f5ad669918c
SHA256 cca093bcfc65e25dd77c849866e110df72526dffbe29d76e11e29c7d888a4030
SHA512 1dc5282d27c49a4b6f921ba5dfc88b8c1d32289df00dd866f9ac6669a5a8d99afeda614bffc7cf61a44375ae73e09cd52606b443b63636977c9cd2ef4fa68a20

/Library/Preferences/com.apple.networkextension.uuidcache.plist

MD5 55d707d8a498ca399dd49c710374392d
SHA1 94956fb7af8ebb24faa018be5739179ae2e21dbb
SHA256 0de9ce482bde894cb5d5042cfeaf0d54cb0f56ad4852caa4d06ad54a53a7b49f
SHA512 e6183083a8f1f1ea5e67806ecbcab5adefc331aca2622e3b846cee48b803a91076dfd9a905573ee71c900bc5563b4e6e7f3ab994de7e29552a01647cd29ad20e

/Users/run/Library/Caches/GeoServices/Resources/altitude-1285.xml

MD5 9a43af57707d2fb460832049d1f217d1
SHA1 056d813f8cb5198ca82072f7e3484f38ea5267f8
SHA256 7224f8828694ed74a8353567e4d84da188d15a993a4a75938f8409cb49218e7c
SHA512 1f33175f5d0958c79540a627552f71c6960b6ff19c9b2b0aa604c00bfeff216f6ea2ec3a22ef91ad8d7249597fdf5ad49ddbf5f4aef71b397e785152474954d7

/Users/run/Library/Caches/GeoServices/ActiveTileGroup.pbd

MD5 f9e111a3f55969996f86befee92b7777
SHA1 1aa4133405f4f8a331182619296052e960ae15d0
SHA256 4a43b81fae4e8c2b6b6bcbe07d58a4920c24d35c4f990e6c81e06673ef1edbdc
SHA512 d78557026822ab97a9f0d0a5f6c2e4b64ba06a0371e50a8c79c262f55d6820823c3b90f6f7f0422589fd012c494ad3f338db6bfaeb348b17d2b72f35dc954710

/Library/Preferences/com.apple.networkextension.uuidcache.plist

MD5 a6ef4856e99c9d8e1d9bb762c5a8503a
SHA1 25d5405ad91791b716ae5a56b37aa2b393854967
SHA256 232441aa129d4f21999860b8bf31db4b8617df9f7d32ef5f25a383edff82d9fa
SHA512 582fa1ea60766a5a4e99b295a8ed98c94f6bab45e42b7e8db61e9ad645f531891082cd457bfd11d660195af86f02c4ed93589e6e6daded683cff2d8319bbc489

/Library/Preferences/com.apple.networkextension.uuidcache.plist

MD5 2f01f7a00c85e424f82b00b2bf794a7c
SHA1 c75cb52aa31012888dd7c65373d5faba6048c425
SHA256 23d6746cb1c1906c9cfb5c69f7377f7cb68965ac0708ed1d600bfd3d3c34ce32
SHA512 75131e0145182653cef2edbb968853c9cb3c26c37c5821f3cd69c3ecdde7979ae37e74ecea8ad333090a473177c6dad43bc34f94a8fd104cd4c9b16c8f7b54f8

/Library/Preferences/com.apple.networkextension.uuidcache.plist

MD5 ce7f5b3d4bfc7b4b0da6a06dccc515f2
SHA1 ce657a52a052a3aaf534ecfbf7cbdde4ee334c10
SHA256 9261ecceda608ef174256e5fdc774c1e6e3dcf533409c1bc393d490d01c713f1
SHA512 db9de6afa0e14c347aa0988a985b8a453ef133a2413c03bae0fab48bda34d4f9a488db104837a386bb65c393e8f11b1ed4856b211c1c186423649c147d6aabfb

Analysis: behavioral9

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

win7-20240221-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe

"C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe"

Network

N/A

Files

memory/2684-7-0x00000000003D0000-0x00000000003E2000-memory.dmp

memory/2684-8-0x0000000000400000-0x000000000149D000-memory.dmp

memory/2684-6-0x00000000003D0000-0x00000000003E2000-memory.dmp

memory/2684-3-0x00000000003B0000-0x00000000003CB000-memory.dmp

memory/2684-2-0x00000000003B0000-0x00000000003CB000-memory.dmp

memory/2684-11-0x00000000003D0000-0x00000000003E2000-memory.dmp

memory/2684-10-0x00000000003B0000-0x00000000003CB000-memory.dmp

memory/2684-9-0x0000000077060000-0x0000000077061000-memory.dmp

memory/2684-16-0x00000000003D0000-0x00000000003E2000-memory.dmp

memory/2684-15-0x00000000003B0000-0x00000000003CB000-memory.dmp

memory/2684-17-0x0000000000400000-0x000000000149D000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

52s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe

"C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8\Xiaomi_Pro_Tool_v3.8.exe"

Network

Files

memory/4452-4-0x0000000001860000-0x000000000187B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\evb5833.tmp

MD5 70f0a349f0d28cbfe011ec6be17b24c7
SHA1 c8b7df21ca89ce02ff67b43c5c5d1b2b6f0600f1
SHA256 fa7aed239c6e1e48a3bb70723adbc632dcf2792c6ae50790d50fe41910602e9e
SHA512 7c6ef336d41e6628e05b3228ccea03e437a16c1f2cfe9bae0186e67e90a0867ec0e190d63537241e6e2baa32c0b33a80d2acf8ee25f13114de0f7f29fe6d8911

memory/4452-9-0x0000000001880000-0x0000000001892000-memory.dmp

memory/4452-8-0x0000000001880000-0x0000000001892000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\evb5834.tmp

MD5 49279bad944e3ed7006b772c4dff8dbb
SHA1 00eeed253b7bfe3b66e248299f056dba5faed22e
SHA256 a6d07d954727b3edfbab7036094bc010b3b0ece307ff8400e185624d53a8955d
SHA512 f72be6d22ddbf84b40e79c8839039106736ace1ce5556ac047fc9cab51790a0222f4cc5f01e38e93988c273bdf421cd2dc21c9f2f4181a24d55283154c4e7433

memory/4452-3-0x0000000001860000-0x000000000187B000-memory.dmp

memory/4452-10-0x0000000000400000-0x000000000149D000-memory.dmp

memory/4452-13-0x0000000001860000-0x000000000187B000-memory.dmp

memory/4452-14-0x0000000001880000-0x0000000001892000-memory.dmp

memory/4452-12-0x0000000077313000-0x0000000077314000-memory.dmp

memory/4452-11-0x0000000077312000-0x0000000077313000-memory.dmp

memory/4452-19-0x0000000001880000-0x0000000001892000-memory.dmp

memory/4452-18-0x0000000001860000-0x000000000187B000-memory.dmp

memory/4452-20-0x0000000000400000-0x000000000149D000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:48

Platform

win7-20240508-en

Max time kernel

120s

Max time network

121s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8.rar

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 8800310000000000a8584185110050524f4752417e310000700008000400efbeee3a851aa85841852a0000003c000000000001000000000000000000460000000000500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff C:\Windows\system32\rundll32.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 C:\Windows\system32\rundll32.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 108 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 108 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 108 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8.rar

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Xiaomi_Pro_Tool_v3.8.rar

Network

N/A

Files

memory/2668-24-0x0000000003ED0000-0x0000000003EE0000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:46

Platform

ubuntu1804-amd64-20240611-en

Max time kernel

0s

Command Line

[/tmp/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/hyp.mbn]

Signatures

N/A

Processes

/tmp/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/hyp.mbn

[/tmp/wt88047_pro_images_V9.2.3.0.LHJCNEK_20171229.0000.00_5.1_cn/images/hyp.mbn]

Network

N/A

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:46

Platform

debian9-armhf-20240418-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-11 21:45

Reported

2024-06-11 21:46

Platform

debian9-mipsbe-20240418-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A