Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 11:34
Static task
static1
Behavioral task
behavioral1
Sample
471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe
Resource
win10v2004-20220812-en
General
-
Target
471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe
-
Size
332KB
-
MD5
0d33ebf415e88bfe0b09ff0803063af1
-
SHA1
58b56cc8da486a0352261a794925967b83c5c60a
-
SHA256
471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006
-
SHA512
d00e61feb72f83487ee62ece8275f84c2d6e82a83fabb335a0cc55fa63f4d37ed0643e458c177deea4d7032067f99475d016644c9148d27e445ed293ca63b64d
-
SSDEEP
3072:XnkRIglgkBfrvok1jrLXvYNJOLlDrDxUfSGIf9b6L6VlMixFGI5FpqMBDzsUizts:gIiZr/rLXeaHDxUadt382FxYIcUuts
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ssxoim.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 ssxoim.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /L" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /n" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /B" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /X" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /g" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /h" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /s" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /C" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /p" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /M" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /t" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /r" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /K" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /k" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /Z" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /l" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /D" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /V" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /x" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /P" ssxoim.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /U" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /Q" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /f" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /R" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /I" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /a" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /i" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /G" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /m" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /A" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /E" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /o" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /W" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /e" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /Y" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /q" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /u" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /N" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /H" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /y" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /F" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /c" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /r" 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /T" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /b" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /w" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /v" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /J" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /z" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /d" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /O" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /j" ssxoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssxoim = "C:\\Users\\Admin\\ssxoim.exe /S" ssxoim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe 1248 ssxoim.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 1248 ssxoim.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1248 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 81 PID 4948 wrote to memory of 1248 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 81 PID 4948 wrote to memory of 1248 4948 471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe"C:\Users\Admin\AppData\Local\Temp\471df7e5563302ca5c696eaf08eb083a7cfe7b369b32ef6795643d4c89227006.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\ssxoim.exe"C:\Users\Admin\ssxoim.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5cc4f1f1a6edfbc99315e51caca700c2f
SHA1129f0a39ffda5a2d4841129f48f1fc84847158dd
SHA256ce0d090b7e8f8b74a51ea4cf4e69c724bcd3b2ddee264d71ea9cc62e57864eac
SHA512e50d2c3ccddd9a41f92c5e940fe82d70d662c319ae360423f750f9c8cbb446076557c9c651cfc4aff5c62f4a24db7c326ed422a62e25fae7b00ada58924a229e
-
Filesize
332KB
MD5cc4f1f1a6edfbc99315e51caca700c2f
SHA1129f0a39ffda5a2d4841129f48f1fc84847158dd
SHA256ce0d090b7e8f8b74a51ea4cf4e69c724bcd3b2ddee264d71ea9cc62e57864eac
SHA512e50d2c3ccddd9a41f92c5e940fe82d70d662c319ae360423f750f9c8cbb446076557c9c651cfc4aff5c62f4a24db7c326ed422a62e25fae7b00ada58924a229e