Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe
Resource
win10v2004-20220812-en
General
-
Target
77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe
-
Size
176KB
-
MD5
308b321e20eccd11b2f7003da1c7f400
-
SHA1
eaca35ebfa8934cde62d82d93bf2ad939f2c3eae
-
SHA256
77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50
-
SHA512
20819b4199026c89e0c11de544a526c09bc35e14c7f9e4688bce2fce61c1457b1ca92dc73f047b6cefe48a753e994d3a453d82dff8b9d27319e04495d4311242
-
SSDEEP
3072:OC1q8Wlh4GWtPuCaAYmG5bcFuKnvmb7/D26inavm4QLzHpXP6D8R8FOjcKvDHmB6:NU8WAGWtPuCaVmG5bnKnvmb7/D26caex
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoietiw.exe -
Executes dropped EXE 1 IoCs
pid Process 1600 xoietiw.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /G" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /P" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /g" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /h" xoietiw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /m" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /R" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /D" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /K" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /i" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /o" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /T" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /c" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /C" xoietiw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /q" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /X" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /V" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /s" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /b" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /H" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /Y" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /t" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /x" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /j" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /r" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /d" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /W" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /a" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /z" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /s" 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /O" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /Z" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /Q" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /N" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /k" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /n" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /J" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /U" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /v" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /e" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /A" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /M" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /u" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /E" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /F" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /w" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /S" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /p" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /I" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /B" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /f" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /y" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /L" xoietiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoietiw = "C:\\Users\\Admin\\xoietiw.exe /l" xoietiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe 1600 xoietiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 1600 xoietiw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1600 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 27 PID 1688 wrote to memory of 1600 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 27 PID 1688 wrote to memory of 1600 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 27 PID 1688 wrote to memory of 1600 1688 77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe"C:\Users\Admin\AppData\Local\Temp\77e2770f78380ae0a9d71c1e70f241f27d2351bc5709946b2b6c2ce29d23dc50.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\xoietiw.exe"C:\Users\Admin\xoietiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5685bdcb26b065466f349669419159724
SHA11aca13afbc73dd817ec812aef00a4c0acf0795c4
SHA256edb50992548e34dc9d4811f1fc723eb72060f013d535ef5977b50de42db91290
SHA5123edadc9b40f083024f9e6c432f42bc2b93c84ea0a5ea19dd02bdd3d13145c01a4e8cb8c5ac67761962dfa67387854efafad8ca611b780026bd2ac8620768952b
-
Filesize
176KB
MD5685bdcb26b065466f349669419159724
SHA11aca13afbc73dd817ec812aef00a4c0acf0795c4
SHA256edb50992548e34dc9d4811f1fc723eb72060f013d535ef5977b50de42db91290
SHA5123edadc9b40f083024f9e6c432f42bc2b93c84ea0a5ea19dd02bdd3d13145c01a4e8cb8c5ac67761962dfa67387854efafad8ca611b780026bd2ac8620768952b
-
Filesize
176KB
MD5685bdcb26b065466f349669419159724
SHA11aca13afbc73dd817ec812aef00a4c0acf0795c4
SHA256edb50992548e34dc9d4811f1fc723eb72060f013d535ef5977b50de42db91290
SHA5123edadc9b40f083024f9e6c432f42bc2b93c84ea0a5ea19dd02bdd3d13145c01a4e8cb8c5ac67761962dfa67387854efafad8ca611b780026bd2ac8620768952b
-
Filesize
176KB
MD5685bdcb26b065466f349669419159724
SHA11aca13afbc73dd817ec812aef00a4c0acf0795c4
SHA256edb50992548e34dc9d4811f1fc723eb72060f013d535ef5977b50de42db91290
SHA5123edadc9b40f083024f9e6c432f42bc2b93c84ea0a5ea19dd02bdd3d13145c01a4e8cb8c5ac67761962dfa67387854efafad8ca611b780026bd2ac8620768952b