Analysis
-
max time kernel
151s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
Resource
win10v2004-20220812-en
General
-
Target
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe
-
Size
196KB
-
MD5
3757d67d6b352bdabdd7359b3d21ed23
-
SHA1
d466234cc88ffc0a8fd661a6a78212f41e157997
-
SHA256
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b
-
SHA512
f8d9241f2e11f3c13f43507bcdcb566122c00d860431d9e089fd51c0fe9aee11111ebdebcfe9b8cd244b813c483fc20670c4c44016044c143a8db761c02bf5b7
-
SSDEEP
6144:+kb4K16oTJWvfU4+bOl8femcK/fObT/bGimszUf7Wqy:51AoTMvs4+bOlNK/fObT/bGipE78
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exexeaka.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeaka.exe -
Executes dropped EXE 1 IoCs
Processes:
xeaka.exepid process 1832 xeaka.exe -
Loads dropped DLL 2 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exepid process 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe -
Adds Run key to start application 2 TTPs 52 IoCs
Processes:
xeaka.exe9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /R" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /k" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /u" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /m" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /G" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /l" xeaka.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /w" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /f" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /E" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /S" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /K" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /C" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /L" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /x" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /N" xeaka.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /p" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /v" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /A" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /U" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /H" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /Y" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /t" 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /I" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /j" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /o" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /V" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /g" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /O" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /W" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /Z" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /X" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /e" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /J" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /P" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /D" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /B" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /Q" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /d" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /y" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /s" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /b" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /M" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /t" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /r" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /c" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /z" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /n" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /h" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /q" xeaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaka = "C:\\Users\\Admin\\xeaka.exe /F" xeaka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exexeaka.exepid process 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe 1832 xeaka.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exexeaka.exepid process 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe 1832 xeaka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exedescription pid process target process PID 1104 wrote to memory of 1832 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe xeaka.exe PID 1104 wrote to memory of 1832 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe xeaka.exe PID 1104 wrote to memory of 1832 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe xeaka.exe PID 1104 wrote to memory of 1832 1104 9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe xeaka.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe"C:\Users\Admin\AppData\Local\Temp\9805195e5550c6a9da0cf9bca510cf328c55b72076b84551872b19672da7913b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\xeaka.exe"C:\Users\Admin\xeaka.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5702add35f7ee744df45fb0ec07b86d0c
SHA14fb4104fe4e71595827d7f426f03ab156db2ddea
SHA256c844c8f1c1caa4379a5d22acd01a0667f99afb5b215bd86bd128bd786510ed37
SHA512950600e392423953e43f6197e642b4c5eafdcb2a4b24551b2b44f2360d7c5fade5889d689a1295b1ca9b7150bb9a2db36b64de41964dbec3be05225abae3b483
-
Filesize
196KB
MD5702add35f7ee744df45fb0ec07b86d0c
SHA14fb4104fe4e71595827d7f426f03ab156db2ddea
SHA256c844c8f1c1caa4379a5d22acd01a0667f99afb5b215bd86bd128bd786510ed37
SHA512950600e392423953e43f6197e642b4c5eafdcb2a4b24551b2b44f2360d7c5fade5889d689a1295b1ca9b7150bb9a2db36b64de41964dbec3be05225abae3b483
-
Filesize
196KB
MD5702add35f7ee744df45fb0ec07b86d0c
SHA14fb4104fe4e71595827d7f426f03ab156db2ddea
SHA256c844c8f1c1caa4379a5d22acd01a0667f99afb5b215bd86bd128bd786510ed37
SHA512950600e392423953e43f6197e642b4c5eafdcb2a4b24551b2b44f2360d7c5fade5889d689a1295b1ca9b7150bb9a2db36b64de41964dbec3be05225abae3b483
-
Filesize
196KB
MD5702add35f7ee744df45fb0ec07b86d0c
SHA14fb4104fe4e71595827d7f426f03ab156db2ddea
SHA256c844c8f1c1caa4379a5d22acd01a0667f99afb5b215bd86bd128bd786510ed37
SHA512950600e392423953e43f6197e642b4c5eafdcb2a4b24551b2b44f2360d7c5fade5889d689a1295b1ca9b7150bb9a2db36b64de41964dbec3be05225abae3b483