Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe
Resource
win10v2004-20220812-en
General
-
Target
453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe
-
Size
320KB
-
MD5
0e65e5ac79ac52c94bf8525303d685e7
-
SHA1
62b52c482ee0769a3b3657583cf34cbe1445799f
-
SHA256
453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890
-
SHA512
16476f49c0f151ab2870d81b9089cfcce0c6e6dccd9c0537941264e880a80240cbc7c2557be5bcd140116ba512b87c89f043b92b6e622a944a5c404001d0c8c2
-
SSDEEP
6144:Py/T5/tn/NbYl/a+fCf8SLJOIrhTyMMGRxF7:6/Tvn/NH+qL8nMMsX7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaooda.exe -
Executes dropped EXE 1 IoCs
pid Process 268 xaooda.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /N" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /I" 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /y" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /d" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /p" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /q" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /B" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /s" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /k" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /h" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /H" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /F" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /b" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /u" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /Q" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /Y" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /j" xaooda.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /L" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /v" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /f" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /o" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /l" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /P" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /M" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /g" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /E" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /z" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /O" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /S" xaooda.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /w" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /T" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /a" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /r" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /e" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /n" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /D" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /A" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /Z" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /J" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /t" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /G" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /W" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /i" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /V" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /U" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /m" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /R" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /I" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /C" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /X" xaooda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaooda = "C:\\Users\\Admin\\xaooda.exe /x" xaooda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe 268 xaooda.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 268 xaooda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 268 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 27 PID 1324 wrote to memory of 268 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 27 PID 1324 wrote to memory of 268 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 27 PID 1324 wrote to memory of 268 1324 453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe"C:\Users\Admin\AppData\Local\Temp\453b29de807a6a421d52a97baa5ef260e9cecdfe8ed60f85c180056c6b287890.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\xaooda.exe"C:\Users\Admin\xaooda.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5956e7547a7118ee9cabba782c18ce9e4
SHA11ceb4fadeea4ca561bd0cfade0eeddc31a012da8
SHA25675161a75d8929d126dd8f1fc17682e5d3aabc78a1c046573be099183d01d7765
SHA512c782a72be79ad2047d7672008bbe04b996f98ec9d89d41f86208b794e01e51adcfca8957488c2d054863c14dea544ba996e86d2250c15bd5997441f9c6aa02e8
-
Filesize
320KB
MD5956e7547a7118ee9cabba782c18ce9e4
SHA11ceb4fadeea4ca561bd0cfade0eeddc31a012da8
SHA25675161a75d8929d126dd8f1fc17682e5d3aabc78a1c046573be099183d01d7765
SHA512c782a72be79ad2047d7672008bbe04b996f98ec9d89d41f86208b794e01e51adcfca8957488c2d054863c14dea544ba996e86d2250c15bd5997441f9c6aa02e8
-
Filesize
320KB
MD5956e7547a7118ee9cabba782c18ce9e4
SHA11ceb4fadeea4ca561bd0cfade0eeddc31a012da8
SHA25675161a75d8929d126dd8f1fc17682e5d3aabc78a1c046573be099183d01d7765
SHA512c782a72be79ad2047d7672008bbe04b996f98ec9d89d41f86208b794e01e51adcfca8957488c2d054863c14dea544ba996e86d2250c15bd5997441f9c6aa02e8
-
Filesize
320KB
MD5956e7547a7118ee9cabba782c18ce9e4
SHA11ceb4fadeea4ca561bd0cfade0eeddc31a012da8
SHA25675161a75d8929d126dd8f1fc17682e5d3aabc78a1c046573be099183d01d7765
SHA512c782a72be79ad2047d7672008bbe04b996f98ec9d89d41f86208b794e01e51adcfca8957488c2d054863c14dea544ba996e86d2250c15bd5997441f9c6aa02e8