Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe
-
Size
1.2MB
-
MD5
8cb8cff47b84554fe4f21bdf180cb92f
-
SHA1
dad4703bb3fbb61a3fbfc3dd8e19a766f0e30681
-
SHA256
11b8c4952ae2770c39a4c3697bf422adbdfd75baa803064c4ed0837a0a9b690a
-
SHA512
34304194550e64a315634d36d33827bfa5f69dca2ca847059b00c53aae18912c807f51d4ad06a3f1e2797e9759dacfd8d15af91a9ec3c8dc7f5bf74551da7986
-
SSDEEP
24576:HbZE7ZDFmpXliM0Q73deojF9BNJHW/1puRTZiUyt4uf:HHGQ7D9BmtpuRIn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2308 WerFault.exe 82 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1084 NETSTAT.EXE 1492 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1084 NETSTAT.EXE Token: SeDebugPrivilege 1492 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3268 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 85 PID 2308 wrote to memory of 3268 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 85 PID 2308 wrote to memory of 3268 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 85 PID 3268 wrote to memory of 1084 3268 cmd.exe 87 PID 3268 wrote to memory of 1084 3268 cmd.exe 87 PID 3268 wrote to memory of 1084 3268 cmd.exe 87 PID 2308 wrote to memory of 2888 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 88 PID 2308 wrote to memory of 2888 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 88 PID 2308 wrote to memory of 2888 2308 2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe 88 PID 2888 wrote to memory of 1492 2888 cmd.exe 90 PID 2888 wrote to memory of 1492 2888 cmd.exe 90 PID 2888 wrote to memory of 1492 2888 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-11_8cb8cff47b84554fe4f21bdf180cb92f_mbrlock_xiaoba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exe/c netstat -an2⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netstat -an2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 13362⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2308 -ip 23081⤵PID:4028