Analysis
-
max time kernel
293s -
max time network
340s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:54
Static task
static1
Behavioral task
behavioral1
Sample
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe
Resource
win10v2004-20221111-en
General
-
Target
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe
-
Size
232KB
-
MD5
2af44da118db4b5ecc49703a91164410
-
SHA1
2325e24b62da556f36dbc3b09c7c61cf10934535
-
SHA256
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20
-
SHA512
e4b0952c488345b1a01b8a167e01f036c6b9af2178b213168b8b297aa81da5f6fc10418c5c04fe2049db210bddd0d07016dc0b53f795bfae32bfe6e5c70f2707
-
SSDEEP
6144:7PBnq0LQ4GoKVjdiOxvUbVcOSWgVxCuq88vvfXZf3:7RLQ4GoKVjdiOxvUbVcOSWg9q8AZf3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exexiifoo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiifoo.exe -
Executes dropped EXE 1 IoCs
Processes:
xiifoo.exepid process 4692 xiifoo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe -
Adds Run key to start application 2 TTPs 47 IoCs
Processes:
xiifoo.exe0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /c" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /I" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /a" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /f" xiifoo.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /v" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /G" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /A" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /r" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /U" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /K" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /y" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /F" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /R" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /Z" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /V" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /W" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /s" 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /h" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /p" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /N" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /e" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /s" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /O" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /J" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /S" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /D" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /w" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /n" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /E" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /Q" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /m" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /t" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /x" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /L" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /M" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /k" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /b" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /i" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /P" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /l" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /g" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /d" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /C" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /o" xiifoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiifoo = "C:\\Users\\Admin\\xiifoo.exe /u" xiifoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exexiifoo.exepid process 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe 4692 xiifoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exexiifoo.exepid process 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe 4692 xiifoo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exedescription pid process target process PID 4260 wrote to memory of 4692 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe xiifoo.exe PID 4260 wrote to memory of 4692 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe xiifoo.exe PID 4260 wrote to memory of 4692 4260 0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe xiifoo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe"C:\Users\Admin\AppData\Local\Temp\0c9ebd4c075129c5304ae8bba1d531799e16890929ba2364e4904870a6f5cc20.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\xiifoo.exe"C:\Users\Admin\xiifoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD505baadf0989f5e768b610b8cfd02eaa5
SHA1e35f8d16edb3b1228fb453e182e63acdc237925b
SHA256c731b4429c03678ce2bf4afd0013d7a8507de17a1242d407daa52adf194c9394
SHA512a0b109fb40945d8f4b7282cfeca09198eebf4a66a25e34dea8c7ad1551ced4bccb501efa5446ec7fbc08ea97524b568e7da03b3e8f86c39fc68183d092ef7278
-
Filesize
232KB
MD505baadf0989f5e768b610b8cfd02eaa5
SHA1e35f8d16edb3b1228fb453e182e63acdc237925b
SHA256c731b4429c03678ce2bf4afd0013d7a8507de17a1242d407daa52adf194c9394
SHA512a0b109fb40945d8f4b7282cfeca09198eebf4a66a25e34dea8c7ad1551ced4bccb501efa5446ec7fbc08ea97524b568e7da03b3e8f86c39fc68183d092ef7278