Analysis

  • max time kernel
    55s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/10/2024, 12:33

General

  • Target

    XstReader.exe

  • Size

    182KB

  • MD5

    66bfedb6e1eb979090dc7bfee238e490

  • SHA1

    60f6aae0967a31b7b0985120572a328ceec3fcf1

  • SHA256

    df6de6df2ab6279b623b916e44dc242cad72b1730509a13dee04420bcff16b47

  • SHA512

    0cd21423b24cdd4f15fc9660612ae80e0279434e04d96a4b4b122e5114c3ecdd2c076d553dc55268bbf9402c8c9fb8d3811c76516d909d6136dbc573be0eaf85

  • SSDEEP

    3072:kc/1lIJtgFBdWbKNpXW+a/CZ1KGHKzfLPPLjCVvBNIZkBRqhvXFnmu:kc0Sm+UCZ0zrLphv4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XstReader.exe
    "C:\Users\Admin\AppData\Local\Temp\XstReader.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3452-0-0x00007FFB94DF3000-0x00007FFB94DF5000-memory.dmp

          Filesize

          8KB

        • memory/3452-1-0x0000000000C80000-0x0000000000CB4000-memory.dmp

          Filesize

          208KB

        • memory/3452-2-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-3-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-4-0x000000001EC60000-0x000000001EC68000-memory.dmp

          Filesize

          32KB

        • memory/3452-5-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-6-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-7-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-11-0x000000001ED60000-0x000000001ED68000-memory.dmp

          Filesize

          32KB

        • memory/3452-13-0x000000001F4F0000-0x000000001F4FE000-memory.dmp

          Filesize

          56KB

        • memory/3452-14-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-12-0x000000001F530000-0x000000001F568000-memory.dmp

          Filesize

          224KB

        • memory/3452-15-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-16-0x00007FFB94DF3000-0x00007FFB94DF5000-memory.dmp

          Filesize

          8KB

        • memory/3452-17-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-18-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-22-0x00007FFB94DF0000-0x00007FFB958B2000-memory.dmp

          Filesize

          10.8MB