Analysis
-
max time kernel
150s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe
Resource
win10v2004-20220812-en
General
-
Target
6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe
-
Size
192KB
-
MD5
6b049df29a72cdd9ff1e99b53daca5c2
-
SHA1
5121b8f1853162905d28957f89db49a23f57adfc
-
SHA256
6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a
-
SHA512
5dd8cb7336ef54126feb1f8ad4bf821b4034d1ef713c44856c97d4824d9bc66886878bb614b1f3d3d7b088ea5aa82622af243268dc5ddad54e5aeb8821321efb
-
SSDEEP
3072:NCeZuCWv2JQcFBKBJy6apbuD2VMbj1hlUyw0/obo:NCeBWvUFIJlapu2V21r/p
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeiota.exe -
Executes dropped EXE 1 IoCs
pid Process 936 xeiota.exe -
Loads dropped DLL 2 IoCs
pid Process 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /a" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /l" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /F" xeiota.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /i" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /Y" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /N" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /M" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /Q" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /T" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /z" xeiota.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /G" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /O" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /o" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /X" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /J" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /j" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /R" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /h" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /g" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /o" 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /D" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /E" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /A" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /k" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /q" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /s" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /u" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /r" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /d" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /t" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /w" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /m" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /f" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /c" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /Z" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /L" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /I" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /W" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /U" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /x" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /n" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /V" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /P" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /C" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /B" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /K" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /y" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /b" xeiota.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeiota = "C:\\Users\\Admin\\xeiota.exe /e" xeiota.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe 936 xeiota.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 936 xeiota.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 668 wrote to memory of 936 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 28 PID 668 wrote to memory of 936 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 28 PID 668 wrote to memory of 936 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 28 PID 668 wrote to memory of 936 668 6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe"C:\Users\Admin\AppData\Local\Temp\6294cca1c2a66354e5495f1c865b0efdf1591d7c63182b44942cffb6b2c7d95a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\xeiota.exe"C:\Users\Admin\xeiota.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD56db9b22fd3f62fa9783b2daac5c7daec
SHA1b2c265216217a5cc85a981259cf3504a31ae4972
SHA256711d83bb4d58033cda9a413daa1edefc37452d552a70e8fb532a3303ba63f29c
SHA512212c23d8658badac89fd6814e220beac2c76d5cf224dde2d45ae86db5b2c7279b269f926a08248fd4fd930d788ed87eff9a3c869dbcf9304e1a6e7aaaa9f32fd
-
Filesize
192KB
MD56db9b22fd3f62fa9783b2daac5c7daec
SHA1b2c265216217a5cc85a981259cf3504a31ae4972
SHA256711d83bb4d58033cda9a413daa1edefc37452d552a70e8fb532a3303ba63f29c
SHA512212c23d8658badac89fd6814e220beac2c76d5cf224dde2d45ae86db5b2c7279b269f926a08248fd4fd930d788ed87eff9a3c869dbcf9304e1a6e7aaaa9f32fd
-
Filesize
192KB
MD56db9b22fd3f62fa9783b2daac5c7daec
SHA1b2c265216217a5cc85a981259cf3504a31ae4972
SHA256711d83bb4d58033cda9a413daa1edefc37452d552a70e8fb532a3303ba63f29c
SHA512212c23d8658badac89fd6814e220beac2c76d5cf224dde2d45ae86db5b2c7279b269f926a08248fd4fd930d788ed87eff9a3c869dbcf9304e1a6e7aaaa9f32fd
-
Filesize
192KB
MD56db9b22fd3f62fa9783b2daac5c7daec
SHA1b2c265216217a5cc85a981259cf3504a31ae4972
SHA256711d83bb4d58033cda9a413daa1edefc37452d552a70e8fb532a3303ba63f29c
SHA512212c23d8658badac89fd6814e220beac2c76d5cf224dde2d45ae86db5b2c7279b269f926a08248fd4fd930d788ed87eff9a3c869dbcf9304e1a6e7aaaa9f32fd