Analysis Overview
SHA256
e9843f3485755bf3f2bb45c8252dd5df87f7c943840c65a05143442d04f9672c
Threat Level: Shows suspicious behavior
The file 2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba was found to be: Shows suspicious behavior.
Malicious Activity Summary
Adds Run key to start application
Writes to the Master Boot Record (MBR)
Drops file in Program Files directory
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Modifies data under HKEY_USERS
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-11 12:47
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 12:47
Reported
2024-06-11 12:47
Platform
win7-20240508-en
Max time kernel
6s
Max time network
7s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Program Files\\System.dll" | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\physicaldrive0 | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\System.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| File opened for modification | C:\Program Files\System.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| File created | C:\Program Files\360.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe"
C:\Windows\system32\LogonUI.exe
"LogonUI.exe" /flags:0x0
C:\Windows\system32\LogonUI.exe
"LogonUI.exe" /flags:0x1
Network
Files
memory/1252-2-0x0000000002F10000-0x0000000002F11000-memory.dmp
memory/2312-3-0x0000000002AB0000-0x0000000002AB1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 12:47
Reported
2024-06-11 12:47
Platform
win10v2004-20240508-en
Max time kernel
2s
Max time network
3s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Program Files\\System.dll" | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\physicaldrive0 | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\360.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| File created | C:\Program Files\System.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| File opened for modification | C:\Program Files\System.dll | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" | C:\Windows\system32\LogonUI.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" | C:\Windows\system32\LogonUI.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "217" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" | C:\Windows\system32\LogonUI.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" | C:\Windows\system32\LogonUI.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe | N/A |
| N/A | N/A | C:\Windows\system32\LogonUI.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-11_28c80739400645b392c9ec6ac2c3fcd4_mbrlock_xiaoba.exe"
C:\Windows\system32\LogonUI.exe
"LogonUI.exe" /flags:0x4 /state0:0xa399a855 /state1:0x41c64e6d