Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe
Resource
win10v2004-20220901-en
General
-
Target
ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe
-
Size
172KB
-
MD5
845ca7719faa6a994e61033737bb8220
-
SHA1
b1e6bff10daa6d2caa2c88fa8370cb34ccc87568
-
SHA256
ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0
-
SHA512
34c6b0d222f0e6a847bf7714236819718c6bacb6c7372a9fe2e78655fbfddd6d1799749cb4211e199ba3186799944ead1460e40c9ab848a437117410dbdb9551
-
SSDEEP
3072:+j1qlB5QqiwcCA0laletdpVinzswyAQjh/gSF3Ef3ykQoz7C4ly:BIqtc30l+2yzswyAQjh/gSF3Ef3ykQoG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caoxoc.exe -
Executes dropped EXE 1 IoCs
pid Process 900 caoxoc.exe -
Loads dropped DLL 2 IoCs
pid Process 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /r" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /p" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /V" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /S" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /F" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /z" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /h" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /k" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /Z" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /x" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /J" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /R" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /E" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /m" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /e" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /q" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /M" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /O" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /C" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /i" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /D" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /N" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /v" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /A" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /a" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /t" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /b" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /X" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /o" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /c" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /w" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /P" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /G" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /L" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /B" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /Y" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /W" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /s" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /H" ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /u" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /U" caoxoc.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /d" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /j" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /K" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /H" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /Q" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /l" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /T" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /n" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /y" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /I" caoxoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\caoxoc = "C:\\Users\\Admin\\caoxoc.exe /g" caoxoc.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ caoxoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe 900 caoxoc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 900 caoxoc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 900 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 28 PID 832 wrote to memory of 900 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 28 PID 832 wrote to memory of 900 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 28 PID 832 wrote to memory of 900 832 ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe"C:\Users\Admin\AppData\Local\Temp\ef59fbf4567a5894fa6ab06f1ab63b83a05930fa8c180104b3bedcb573def9e0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\caoxoc.exe"C:\Users\Admin\caoxoc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD52e6e3cae7930795ee126df555dbc2205
SHA10f122eb5286bfbe6381b27826d3186f414bffcd9
SHA256c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d
SHA512c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683
-
Filesize
172KB
MD52e6e3cae7930795ee126df555dbc2205
SHA10f122eb5286bfbe6381b27826d3186f414bffcd9
SHA256c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d
SHA512c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683
-
Filesize
172KB
MD52e6e3cae7930795ee126df555dbc2205
SHA10f122eb5286bfbe6381b27826d3186f414bffcd9
SHA256c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d
SHA512c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683
-
Filesize
172KB
MD52e6e3cae7930795ee126df555dbc2205
SHA10f122eb5286bfbe6381b27826d3186f414bffcd9
SHA256c488924d2b636c1c58c5f91b052866e7393e0426d195a5bc36119ba8732db79d
SHA512c69232d242658d73b667461f995537bc90eaee5aeefd2ebbdbf9e9e78cb64797c7f1a47f2933f161061721754a9b7c9d7bd8178d557499da055e236929d3a683