Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:56
Static task
static1
Behavioral task
behavioral1
Sample
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe
Resource
win10v2004-20221111-en
General
-
Target
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe
-
Size
244KB
-
MD5
442b62ad63c76b465da5b97e21d69cd0
-
SHA1
b2f19ecc58da3686e53542d49eb5b871b533bf6a
-
SHA256
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e
-
SHA512
1ec24a24133dc93819285d6ef344f1d10c95d3f857d9bc411b8aadca723310468e74154e54a2e339cc2f510c8b1390fb36ceff5d2d741b9d57950f0a7b6bacff
-
SSDEEP
6144:7IN/tUVMpcE8gKRzl6j13YW7ysRnt4xjCtPCrLudlGU6n5Gd:C1P8gwl6j13YW7ysRnt4xjCCrLudlN6o
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exexohes.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xohes.exe -
Executes dropped EXE 1 IoCs
Processes:
xohes.exepid process 1148 xohes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
xohes.exe0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /j" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /p" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /h" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /s" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /o" xohes.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /i" 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /t" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /k" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /z" xohes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xohes = "C:\\Users\\Admin\\xohes.exe /y" xohes.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
xohes.exe0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 xohes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum xohes.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
xohes.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf xohes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exexohes.exepid process 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe 1148 xohes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exexohes.exepid process 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe 1148 xohes.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exedescription pid process target process PID 3120 wrote to memory of 1148 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe xohes.exe PID 3120 wrote to memory of 1148 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe xohes.exe PID 3120 wrote to memory of 1148 3120 0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe xohes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe"C:\Users\Admin\AppData\Local\Temp\0db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\xohes.exe"C:\Users\Admin\xohes.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5442b62ad63c76b465da5b97e21d69cd0
SHA1b2f19ecc58da3686e53542d49eb5b871b533bf6a
SHA2560db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e
SHA5121ec24a24133dc93819285d6ef344f1d10c95d3f857d9bc411b8aadca723310468e74154e54a2e339cc2f510c8b1390fb36ceff5d2d741b9d57950f0a7b6bacff
-
Filesize
244KB
MD5442b62ad63c76b465da5b97e21d69cd0
SHA1b2f19ecc58da3686e53542d49eb5b871b533bf6a
SHA2560db9a7759652a023c39187c22482eb2c268d3682385b6b2f056735bfdcc0004e
SHA5121ec24a24133dc93819285d6ef344f1d10c95d3f857d9bc411b8aadca723310468e74154e54a2e339cc2f510c8b1390fb36ceff5d2d741b9d57950f0a7b6bacff