Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
-
Size
1.2MB
-
MD5
8cb8cff47b84554fe4f21bdf180cb92f
-
SHA1
dad4703bb3fbb61a3fbfc3dd8e19a766f0e30681
-
SHA256
11b8c4952ae2770c39a4c3697bf422adbdfd75baa803064c4ed0837a0a9b690a
-
SHA512
34304194550e64a315634d36d33827bfa5f69dca2ca847059b00c53aae18912c807f51d4ad06a3f1e2797e9759dacfd8d15af91a9ec3c8dc7f5bf74551da7986
-
SSDEEP
24576:HbZE7ZDFmpXliM0Q73deojF9BNJHW/1puRTZiUyt4uf:HHGQ7D9BmtpuRIn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2232 1736 WerFault.exe 28 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2324 NETSTAT.EXE 1948 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2324 NETSTAT.EXE Token: SeDebugPrivilege 1948 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2064 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 29 PID 1736 wrote to memory of 2064 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 29 PID 1736 wrote to memory of 2064 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 29 PID 1736 wrote to memory of 2064 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 29 PID 2064 wrote to memory of 2324 2064 cmd.exe 31 PID 2064 wrote to memory of 2324 2064 cmd.exe 31 PID 2064 wrote to memory of 2324 2064 cmd.exe 31 PID 2064 wrote to memory of 2324 2064 cmd.exe 31 PID 1736 wrote to memory of 2336 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 32 PID 1736 wrote to memory of 2336 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 32 PID 1736 wrote to memory of 2336 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 32 PID 1736 wrote to memory of 2336 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 32 PID 2336 wrote to memory of 1948 2336 cmd.exe 34 PID 2336 wrote to memory of 1948 2336 cmd.exe 34 PID 2336 wrote to memory of 1948 2336 cmd.exe 34 PID 2336 wrote to memory of 1948 2336 cmd.exe 34 PID 1736 wrote to memory of 2232 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 35 PID 1736 wrote to memory of 2232 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 35 PID 1736 wrote to memory of 2232 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 35 PID 1736 wrote to memory of 2232 1736 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe/c netstat -an2⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netstat -an2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 8322⤵
- Program crash
PID:2232
-