Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe
Resource
win10v2004-20221111-en
General
-
Target
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe
-
Size
168KB
-
MD5
454a3fb58e149902f7727496391200e0
-
SHA1
4c9c5be7fbf71a84e53c770d7520f5593cc8c980
-
SHA256
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100
-
SHA512
67348ebe3ae99386a47cfd7e516865d7a136fb521054f1a461808ee67e6356bbb0729d48f3413dee8910bbf6223fe59021f9b4eead77b248c5f5411ad1a019ac
-
SSDEEP
768:c4lvMajhJP5iUwbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGBEv:c4RlVJh+lGVs4emEFbMP0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xuoufo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuoufo.exe -
Executes dropped EXE 1 IoCs
Processes:
xuoufo.exepid process 2040 xuoufo.exe -
Loads dropped DLL 2 IoCs
Processes:
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exepid process 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe -
Adds Run key to start application 2 TTPs 48 IoCs
Processes:
xuoufo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /A" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /R" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /X" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /v" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /T" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /Q" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /c" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /Z" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /g" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /m" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /N" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /S" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /u" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /E" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /q" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /e" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /n" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /V" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /Y" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /h" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /D" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /U" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /F" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /L" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /w" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /t" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /f" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /b" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /i" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /k" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /W" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /J" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /r" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /p" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /I" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /K" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /x" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /s" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /o" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /G" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /d" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /y" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /z" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /B" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /a" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /H" xuoufo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuoufo = "C:\\Users\\Admin\\xuoufo.exe /C" xuoufo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xuoufo.exepid process 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe 2040 xuoufo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exexuoufo.exepid process 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe 2040 xuoufo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exexuoufo.exedescription pid process target process PID 1204 wrote to memory of 2040 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe xuoufo.exe PID 1204 wrote to memory of 2040 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe xuoufo.exe PID 1204 wrote to memory of 2040 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe xuoufo.exe PID 1204 wrote to memory of 2040 1204 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe xuoufo.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe PID 2040 wrote to memory of 1204 2040 xuoufo.exe 2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe"C:\Users\Admin\AppData\Local\Temp\2a07b35d0e67d8411f0145c2de91ff750ae97fb06f851e71b478f7805f7cc100.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\xuoufo.exe"C:\Users\Admin\xuoufo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e039960a338de508adfc3eace28af286
SHA15eb525a5310e56891521be95d502c30d3e0673eb
SHA2566175bf7c1cd5f0db48870199600db8481b35bf51c218ad31e342ccaaf53b0cfa
SHA5120acf395b4249a9301f57a99030b79b45510496b0b5465d662dbb4166ca8d9f307a4c85ebf72d035935f5daad09c90df0d64807a6f9bd7dbff25c0024f8acb041
-
Filesize
168KB
MD5e039960a338de508adfc3eace28af286
SHA15eb525a5310e56891521be95d502c30d3e0673eb
SHA2566175bf7c1cd5f0db48870199600db8481b35bf51c218ad31e342ccaaf53b0cfa
SHA5120acf395b4249a9301f57a99030b79b45510496b0b5465d662dbb4166ca8d9f307a4c85ebf72d035935f5daad09c90df0d64807a6f9bd7dbff25c0024f8acb041
-
Filesize
168KB
MD5e039960a338de508adfc3eace28af286
SHA15eb525a5310e56891521be95d502c30d3e0673eb
SHA2566175bf7c1cd5f0db48870199600db8481b35bf51c218ad31e342ccaaf53b0cfa
SHA5120acf395b4249a9301f57a99030b79b45510496b0b5465d662dbb4166ca8d9f307a4c85ebf72d035935f5daad09c90df0d64807a6f9bd7dbff25c0024f8acb041
-
Filesize
168KB
MD5e039960a338de508adfc3eace28af286
SHA15eb525a5310e56891521be95d502c30d3e0673eb
SHA2566175bf7c1cd5f0db48870199600db8481b35bf51c218ad31e342ccaaf53b0cfa
SHA5120acf395b4249a9301f57a99030b79b45510496b0b5465d662dbb4166ca8d9f307a4c85ebf72d035935f5daad09c90df0d64807a6f9bd7dbff25c0024f8acb041