Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02/12/2021, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
xd.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
xd.exe
Resource
win10-en-20211104
General
-
Target
xd.exe
-
Size
42KB
-
MD5
a034f79273e3f61d34eeadf38f12dee2
-
SHA1
9c8feeab65f71344713d63f4879e247aba49dce4
-
SHA256
903c04976fa6e6721c596354f383a4d4272c6730b29eee00b0ec599265963e74
-
SHA512
f88ae1a3fdc901e49c3ddae6008f80c3b647f2fb88d32c9d726d91f52f65d5af5b2c6c0bdc9dba556f797e9c9075befb4d639a1b6ff990b060bdb081f2945caf
Malware Config
Extracted
C:\PerfLogs\Hello.txt
https://tox.chat/download.html
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ExitStart.tif.hello xd.exe File renamed C:\Users\Admin\Pictures\JoinShow.crw => C:\Users\Admin\Pictures\JoinShow.crw.hello xd.exe File renamed C:\Users\Admin\Pictures\RestartSubmit.tiff => C:\Users\Admin\Pictures\RestartSubmit.tiff.hello xd.exe File renamed C:\Users\Admin\Pictures\SkipOut.tif => C:\Users\Admin\Pictures\SkipOut.tif.hello xd.exe File opened for modification C:\Users\Admin\Pictures\CheckpointShow.tiff.hello xd.exe File renamed C:\Users\Admin\Pictures\ExitStart.tif => C:\Users\Admin\Pictures\ExitStart.tif.hello xd.exe File renamed C:\Users\Admin\Pictures\InitializeClear.crw => C:\Users\Admin\Pictures\InitializeClear.crw.hello xd.exe File opened for modification C:\Users\Admin\Pictures\InitializeClear.crw.hello xd.exe File renamed C:\Users\Admin\Pictures\PublishExit.crw => C:\Users\Admin\Pictures\PublishExit.crw.hello xd.exe File opened for modification C:\Users\Admin\Pictures\SkipOut.tif.hello xd.exe File opened for modification C:\Users\Admin\Pictures\CheckpointShow.tiff xd.exe File renamed C:\Users\Admin\Pictures\CheckpointShow.tiff => C:\Users\Admin\Pictures\CheckpointShow.tiff.hello xd.exe File opened for modification C:\Users\Admin\Pictures\RestartSubmit.tiff.hello xd.exe File opened for modification C:\Users\Admin\Pictures\RestartSubmit.tiff xd.exe File renamed C:\Users\Admin\Pictures\FormatRevoke.raw => C:\Users\Admin\Pictures\FormatRevoke.raw.hello xd.exe File opened for modification C:\Users\Admin\Pictures\FormatRevoke.raw.hello xd.exe File opened for modification C:\Users\Admin\Pictures\JoinShow.crw.hello xd.exe File opened for modification C:\Users\Admin\Pictures\PublishExit.crw.hello xd.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: xd.exe File opened (read-only) \??\K: xd.exe File opened (read-only) \??\Q: xd.exe File opened (read-only) \??\T: xd.exe File opened (read-only) \??\U: xd.exe File opened (read-only) \??\O: xd.exe File opened (read-only) \??\A: xd.exe File opened (read-only) \??\F: xd.exe File opened (read-only) \??\M: xd.exe File opened (read-only) \??\Y: xd.exe File opened (read-only) \??\P: xd.exe File opened (read-only) \??\S: xd.exe File opened (read-only) \??\G: xd.exe File opened (read-only) \??\L: xd.exe File opened (read-only) \??\Z: xd.exe File opened (read-only) \??\W: xd.exe File opened (read-only) \??\E: xd.exe File opened (read-only) \??\J: xd.exe File opened (read-only) \??\X: xd.exe File opened (read-only) \??\N: xd.exe File opened (read-only) \??\R: xd.exe File opened (read-only) \??\I: xd.exe File opened (read-only) \??\V: xd.exe File opened (read-only) \??\B: xd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00256_.WMF xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00642_.WMF xd.exe File opened for modification C:\Program Files\Java\jre7\release.hello xd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html.hello xd.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\Hello.txt xd.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\SaslPrepProfile_norm_bidi.spp xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\TAB_ON.GIF.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-api-caching.xml.hello xd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\vlc.mo xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00414_.WMF xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03236_.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JNGLE_01.MID.hello xd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-next-static.png xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+1 xd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\cpu.css xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Urban.xml.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_ja_4.4.0.v20140623020002.jar.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21307_.GIF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153265.WMF xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NEWS.DPV.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN096.XML.hello xd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml xd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql_2.0.100.v20131211-1531.jar.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14582_.GIF.hello xd.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\MSOINTL.DLL.IDX_DLL.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0215086.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105588.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Abidjan.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4.ssl_1.0.0.v20140827-1444.jar xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-options.xml.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_ja.jar.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-attach_ja.jar.hello xd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\22.png xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099181.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR43F.GIF xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14833_.GIF.hello xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_zh_CN.jar.hello xd.exe File opened for modification C:\Program Files\Java\jre7\lib\meta-index.hello xd.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Samara xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152414.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\StaticText.jpg xd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml xd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00116_.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.GIF xd.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\AXIS.ELM xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\GRIPMASK.BMP xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALENDAR.XML.hello xd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv xd.exe File created C:\Program Files\MSBuild\Hello.txt xd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185834.WMF xd.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\RSSFeeds.html xd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-5 xd.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml xd.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_received.gif xd.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Hello.txt xd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\http.luac.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00260_.WMF.hello xd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR14F.GIF.hello xd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1072 vssadmin.exe 744 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1456 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1856 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe 1708 xd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1048 vssvc.exe Token: SeRestorePrivilege 1048 vssvc.exe Token: SeAuditPrivilege 1048 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1648 1708 xd.exe 27 PID 1708 wrote to memory of 1648 1708 xd.exe 27 PID 1708 wrote to memory of 1648 1708 xd.exe 27 PID 1648 wrote to memory of 1072 1648 cmd.exe 29 PID 1648 wrote to memory of 1072 1648 cmd.exe 29 PID 1648 wrote to memory of 1072 1648 cmd.exe 29 PID 1708 wrote to memory of 1728 1708 xd.exe 35 PID 1708 wrote to memory of 1728 1708 xd.exe 35 PID 1708 wrote to memory of 1728 1708 xd.exe 35 PID 1708 wrote to memory of 1916 1708 xd.exe 37 PID 1708 wrote to memory of 1916 1708 xd.exe 37 PID 1708 wrote to memory of 1916 1708 xd.exe 37 PID 1728 wrote to memory of 744 1728 cmd.exe 39 PID 1728 wrote to memory of 744 1728 cmd.exe 39 PID 1728 wrote to memory of 744 1728 cmd.exe 39 PID 1916 wrote to memory of 1856 1916 cmd.exe 40 PID 1916 wrote to memory of 1856 1916 cmd.exe 40 PID 1916 wrote to memory of 1856 1916 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\xd.exe"C:\Users\Admin\AppData\Local\Temp\xd.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:744
-
-
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\xd.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1856
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\Hello.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:1456