Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 06:57

General

  • Target

    2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe

  • Size

    1.2MB

  • MD5

    8cb8cff47b84554fe4f21bdf180cb92f

  • SHA1

    dad4703bb3fbb61a3fbfc3dd8e19a766f0e30681

  • SHA256

    11b8c4952ae2770c39a4c3697bf422adbdfd75baa803064c4ed0837a0a9b690a

  • SHA512

    34304194550e64a315634d36d33827bfa5f69dca2ca847059b00c53aae18912c807f51d4ad06a3f1e2797e9759dacfd8d15af91a9ec3c8dc7f5bf74551da7986

  • SSDEEP

    24576:HbZE7ZDFmpXliM0Q73deojF9BNJHW/1puRTZiUyt4uf:HHGQ7D9BmtpuRIn

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      /c netstat -an
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\SysWOW64\NETSTAT.EXE
        netstat -an
        3⤵
        • Gathers network information
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c netstat -an
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\NETSTAT.EXE
        netstat -an
        3⤵
        • Gathers network information
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 1336
      2⤵
      • Program crash
      PID:2784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2308 -ip 2308
    1⤵
      PID:4028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads