Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 21:04
Static task
static1
General
-
Target
XBinderOutput.exe
-
Size
629KB
-
MD5
ca7cbed2db2ddc355d1a991ae33f9b7b
-
SHA1
7720c740b3f5f579acaae6cd152602d4b1fc62b5
-
SHA256
e1400af60f1a0a76a2d0d47b8bb9425265441f05118469a55598b2233276200f
-
SHA512
c0e0205a0657f4788d521305066ca587eed53f85ffb92c38d0231c051faf87b73acae67e433b9129b3d11daca02a0a5cf3d7bde20030b0f61ff83ff2cabd5f6a
-
SSDEEP
12288:IpdVfrKp5SBUOvkD/gKVGDHszAVXMG2n+z2x0K73fsZOXFg:Ipd9K7MlGXwz+AV8G2OpQSy
Malware Config
Signatures
-
Class file contains resources related to AdWind 1 IoCs
resource yara_rule sample family_adwind4 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation XBinderOutput.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings XBinderOutput.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 408 wrote to memory of 1424 408 XBinderOutput.exe 88 PID 408 wrote to memory of 1424 408 XBinderOutput.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\feina.jar"2⤵
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD5058360c1290836aee58fa8f27e51fd5c
SHA1f311561acbd74dfb6bfd5977dbeb76302da4ccc3
SHA25647fcd8080e7a0ede413fd0a6dcdc5dea9e7ea2ce83b8c8c2ca78922cd822720d
SHA5120d6856b489635a1fa5b60adf1fe8dbfe12fbaa7b4b8e14a54fecb438a2fd75771ff272d7ac57d16ce105eac52a18447ad4b35f1111d9642af3516da2d7d4d29d