Analysis
-
max time kernel
141s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 14:38
Behavioral task
behavioral1
Sample
XUNXINGTONG/155绿色软件站.url
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
XUNXINGTONG/155绿色软件站.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
XUNXINGTONG/XUNXINGTONG.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
XUNXINGTONG/XUNXINGTONG.exe
Resource
win10v2004-20240709-en
General
-
Target
XUNXINGTONG/XUNXINGTONG.exe
-
Size
436KB
-
MD5
9738c0c7c85b3ce6b12c7061265d720b
-
SHA1
1e2609efac33d08dabfa6457bccbb4db24688bef
-
SHA256
5ef81e3c728926350081d872b577942aaa6253b3e214c29a6c42fb9cb4605f70
-
SHA512
49376c629df839a382155183a78491feca352c8679634a953590e5714827ea9a689a7b1d53e6ac22e10e7848b62476cd457d5b032e974bc0a7e523aa5409bc24
-
SSDEEP
12288:8ei2C2atBw21oaux42l5dtRnSibSHx0tf3:JPpDR4+XnSBR0t
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" XUNXINGTONG.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch XUNXINGTONG.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" XUNXINGTONG.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Software\Microsoft\Internet Explorer\IESettingSync XUNXINGTONG.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4580 XUNXINGTONG.exe 4580 XUNXINGTONG.exe 4580 XUNXINGTONG.exe 4580 XUNXINGTONG.exe 4580 XUNXINGTONG.exe