Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe
Resource
win10v2004-20220901-en
General
-
Target
9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe
-
Size
184KB
-
MD5
7163444202383c41991983e09aa98027
-
SHA1
ea9b17a2e89db9e9971e178646d180c060074153
-
SHA256
9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0
-
SHA512
61d1ca6e58026575258564d602727fd3de8357e765a209035add4dddde1a2462b5bdc1a889125a2d4aaa30d4a46a9a559dbb27978ae7069d0bccb1d7c2edd7c0
-
SSDEEP
3072:dDsTvy5dEK93mUIy4XSWvkILV1GcRTfSgOKcc330xdZZZZ:l5dEE3mYWvkILV1fn0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xieka = "C:\\Users\\Admin\\xieka.exe /w" 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe 4248 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4248 9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe"C:\Users\Admin\AppData\Local\Temp\9a679d6c9026bcad144627d050dfd0443bb0b5352b523ac7ca691027d0118fd0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4248