Analysis
-
max time kernel
153s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe
Resource
win10v2004-20221111-en
General
-
Target
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe
-
Size
196KB
-
MD5
39fdbb206b70d09e51226dd52c84e0e3
-
SHA1
08de682415e0d3d48c08500b00397c6beaa62396
-
SHA256
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1
-
SHA512
6e505d763bdadb197259ca4b75ae7dd03f384f5a01001f1ef33cda5b7f67132cd31777697126ac4ff0af3571351c33cf2d2e115e2093bd2dbcfbe045b5ddc0ef
-
SSDEEP
6144:lXiuUPH3bX2a23NYcJQ8TfxZ85WJ007G9tSBN7+ft:liuUPH3bX2a23NYcJQ8TfxZ9J0rtSz61
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exexoupoi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoupoi.exe -
Executes dropped EXE 1 IoCs
Processes:
xoupoi.exepid process 1456 xoupoi.exe -
Loads dropped DLL 2 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exepid process 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe -
Adds Run key to start application 2 TTPs 47 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exexoupoi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /N" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /S" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /s" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /t" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /O" xoupoi.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /i" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /D" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /R" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /P" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /F" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /a" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /e" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /y" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /d" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /Q" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /A" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /o" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /L" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /V" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /I" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /E" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /J" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /T" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /b" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /K" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /h" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /k" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /q" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /M" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /x" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /r" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /C" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /u" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /U" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /j" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /Y" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /x" bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /f" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /p" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /X" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /n" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /W" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /c" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /g" xoupoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoupoi = "C:\\Users\\Admin\\xoupoi.exe /z" xoupoi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exexoupoi.exepid process 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe 1456 xoupoi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exexoupoi.exepid process 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe 1456 xoupoi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exedescription pid process target process PID 972 wrote to memory of 1456 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe xoupoi.exe PID 972 wrote to memory of 1456 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe xoupoi.exe PID 972 wrote to memory of 1456 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe xoupoi.exe PID 972 wrote to memory of 1456 972 bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe xoupoi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe"C:\Users\Admin\AppData\Local\Temp\bb6d4b6616667d1806ab8d14a564a8420cf5ab7b5ab4d28d2f67031a807eb9d1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\xoupoi.exe"C:\Users\Admin\xoupoi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD589ed9422682284896605a11d654922ac
SHA124513142ed73ff78cd0c42193d721eb80dd1ed4b
SHA2563bf1762825d165b0871ee1ef3fe843dee9206816f661d7ec93b47b1ef00a3942
SHA512c477927994729f6a3f2e4fbfd3f9431740fe3d7e576c37e39d12ca212f36e0ba4967f76d302d355a6f3d9e01218af3b8380cdee4fd7eb5215e49a10f8800dd38
-
Filesize
196KB
MD589ed9422682284896605a11d654922ac
SHA124513142ed73ff78cd0c42193d721eb80dd1ed4b
SHA2563bf1762825d165b0871ee1ef3fe843dee9206816f661d7ec93b47b1ef00a3942
SHA512c477927994729f6a3f2e4fbfd3f9431740fe3d7e576c37e39d12ca212f36e0ba4967f76d302d355a6f3d9e01218af3b8380cdee4fd7eb5215e49a10f8800dd38
-
Filesize
196KB
MD589ed9422682284896605a11d654922ac
SHA124513142ed73ff78cd0c42193d721eb80dd1ed4b
SHA2563bf1762825d165b0871ee1ef3fe843dee9206816f661d7ec93b47b1ef00a3942
SHA512c477927994729f6a3f2e4fbfd3f9431740fe3d7e576c37e39d12ca212f36e0ba4967f76d302d355a6f3d9e01218af3b8380cdee4fd7eb5215e49a10f8800dd38
-
Filesize
196KB
MD589ed9422682284896605a11d654922ac
SHA124513142ed73ff78cd0c42193d721eb80dd1ed4b
SHA2563bf1762825d165b0871ee1ef3fe843dee9206816f661d7ec93b47b1ef00a3942
SHA512c477927994729f6a3f2e4fbfd3f9431740fe3d7e576c37e39d12ca212f36e0ba4967f76d302d355a6f3d9e01218af3b8380cdee4fd7eb5215e49a10f8800dd38