Analysis
-
max time kernel
187s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe
Resource
win10v2004-20220812-en
General
-
Target
80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe
-
Size
212KB
-
MD5
7d43a68e766ff299dd6b5bace62efb20
-
SHA1
73cc42a1789ace4d679201300afd1547e8279d71
-
SHA256
80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011
-
SHA512
88e18f93a1bd14aa4f83da3c104d5cfb28409dfb9cd9f96ae2fc146ea60e4c2c3280c00478200980d526e43b915938bf194fbf1ff4477ba52d8b4f4c100f0743
-
SSDEEP
6144:0zrAQlUWF/B/XQSA5g9+plxVSzfuDkZHxUZgyagnZYsHmv+3sH3OU5GGE9EsWR1y:+kQHngnZYsGQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuiqoo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 xuiqoo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /x" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /q" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /k" xuiqoo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /c" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /p" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /e" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /y" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /u" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /z" 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /n" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /z" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /h" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /t" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /d" xuiqoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiqoo = "C:\\Users\\Admin\\xuiqoo.exe /v" xuiqoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe 2316 xuiqoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 2316 xuiqoo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2316 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 88 PID 2224 wrote to memory of 2316 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 88 PID 2224 wrote to memory of 2316 2224 80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe"C:\Users\Admin\AppData\Local\Temp\80ac0b767053c32c11bea7e5a3e7f02c4464649da5e3c1a520bb57d69c26e011.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\xuiqoo.exe"C:\Users\Admin\xuiqoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD526e912d8a1fe7d5aa51368ae5c52da4a
SHA1edbc974ac9fe9297710a3835add202f526864e31
SHA25659a7990bc2005debd2f94ad35f069ed7614c6092e97241574298f71917846564
SHA512c751d5825a4552ae4b5308d83b4d40977877ebd47f94f996f2291cb41839ae781281c4c14551d68e186cc433b17b326eb26b0ac39ba1d8742421355b38185db2
-
Filesize
212KB
MD526e912d8a1fe7d5aa51368ae5c52da4a
SHA1edbc974ac9fe9297710a3835add202f526864e31
SHA25659a7990bc2005debd2f94ad35f069ed7614c6092e97241574298f71917846564
SHA512c751d5825a4552ae4b5308d83b4d40977877ebd47f94f996f2291cb41839ae781281c4c14551d68e186cc433b17b326eb26b0ac39ba1d8742421355b38185db2