Analysis
-
max time kernel
181s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Resource
win10v2004-20221111-en
General
-
Target
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
-
Size
172KB
-
MD5
577e2d7e85d2439c9ecf2bd47c6bb03b
-
SHA1
3b5a83ecd55f92bebf5315a8db50c3ea8affb5ef
-
SHA256
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2
-
SHA512
3ddb5a8effb96fd6f55ed1f0831dd37120d5c096a0da21cf9d5ce066dfb956b4f936038b78004198bbf840018a40e55e8f37b60e164ef01c291278aa9ad9784b
-
SSDEEP
1536:sZh0k1ZAYNMUAEeKWScfp3p9MQsoz2fRnleTtbjpeMyowLJn7:WpdWScfp3zsLt6bVejd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xiooqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiooqi.exe -
Executes dropped EXE 1 IoCs
Processes:
xiooqi.exepid process 4032 xiooqi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe -
Adds Run key to start application 2 TTPs 50 IoCs
Processes:
xiooqi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /U" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /L" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /J" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /z" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /s" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /B" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /b" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /D" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /k" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /x" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /Q" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /A" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /f" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /i" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /g" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /p" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /l" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /v" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /y" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /P" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /h" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /m" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /O" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /K" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /F" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /N" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /X" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /r" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /I" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /V" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /Y" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /M" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /E" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /t" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /e" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /o" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /S" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /c" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /d" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /w" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /H" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /R" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /q" xiooqi.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /T" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /u" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /n" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /a" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /C" xiooqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiooqi = "C:\\Users\\Admin\\xiooqi.exe /j" xiooqi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xiooqi.exepid process 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe 4032 xiooqi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exexiooqi.exepid process 5064 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe 4032 xiooqi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exexiooqi.exedescription pid process target process PID 5064 wrote to memory of 4032 5064 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe xiooqi.exe PID 5064 wrote to memory of 4032 5064 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe xiooqi.exe PID 5064 wrote to memory of 4032 5064 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe xiooqi.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe PID 4032 wrote to memory of 5064 4032 xiooqi.exe 391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe"C:\Users\Admin\AppData\Local\Temp\391fa22faa26d984b10297b2a9d288e847b19354713f2e62ca18b336e52cf8a2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\xiooqi.exe"C:\Users\Admin\xiooqi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5931769759b7674398b39759ccc631c61
SHA1b738e669302cd7e1236177a72e7f5cd4af15bee4
SHA256c27bf92e2ceef8af0029f9815a95f8fd047bf9b070033fb0c07e67b040ed726c
SHA512803b7011e5927cbe5669b0801419ebd00212b9299118783bd4ee79f413b7e5e6b36ad42ce8f53cce73024647dada492fb80e06e71b8f03ece5e30bff91d9585b
-
Filesize
172KB
MD5931769759b7674398b39759ccc631c61
SHA1b738e669302cd7e1236177a72e7f5cd4af15bee4
SHA256c27bf92e2ceef8af0029f9815a95f8fd047bf9b070033fb0c07e67b040ed726c
SHA512803b7011e5927cbe5669b0801419ebd00212b9299118783bd4ee79f413b7e5e6b36ad42ce8f53cce73024647dada492fb80e06e71b8f03ece5e30bff91d9585b