Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:20

General

  • Target

    20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe

  • Size

    224KB

  • MD5

    0776cea7056519c733f5fcb0c2eb506e

  • SHA1

    d9a9fc03137e9b24396d90b5d6e0c47ab6c7a1ea

  • SHA256

    20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d

  • SHA512

    a9097a1fef6462af39bd2ce7bb54f3bbb6c10d4fd77c9170b324a495118ff69aa94ef9c1651b05988cb1f8375be8ca7aab689ea950eb17c582b2c613dfbb4c15

  • SSDEEP

    3072:W5IIbbsIqrgl4iEzjKTF40qVA0KNBx8lDA:W5IegIqrgCHpXA0KZ8O

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe
    "C:\Users\Admin\AppData\Local\Temp\20507798c83f15f870013e36cbb6557a95e824d79030670926da9f6bc48b600d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\xaiub.exe
      "C:\Users\Admin\xaiub.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaiub.exe

    Filesize

    224KB

    MD5

    9ba467dd45b9944d7527fbf7e3172941

    SHA1

    b33b4b30dc5b853c0e59f2631f31f8992f6a018d

    SHA256

    cd4e0916f0b0c629ee5f63b18e11db3828a1b273ab6102802fcadc4dde9e6c3c

    SHA512

    08eaead62a445fed98d16e335b1b32209a41b22f08a7e1276d0494b02815d0af8a5ca6b74b729285f8c91068b6b853a4c2dda79c3f7a04e5f9700da193599827

  • C:\Users\Admin\xaiub.exe

    Filesize

    224KB

    MD5

    9ba467dd45b9944d7527fbf7e3172941

    SHA1

    b33b4b30dc5b853c0e59f2631f31f8992f6a018d

    SHA256

    cd4e0916f0b0c629ee5f63b18e11db3828a1b273ab6102802fcadc4dde9e6c3c

    SHA512

    08eaead62a445fed98d16e335b1b32209a41b22f08a7e1276d0494b02815d0af8a5ca6b74b729285f8c91068b6b853a4c2dda79c3f7a04e5f9700da193599827

  • \Users\Admin\xaiub.exe

    Filesize

    224KB

    MD5

    9ba467dd45b9944d7527fbf7e3172941

    SHA1

    b33b4b30dc5b853c0e59f2631f31f8992f6a018d

    SHA256

    cd4e0916f0b0c629ee5f63b18e11db3828a1b273ab6102802fcadc4dde9e6c3c

    SHA512

    08eaead62a445fed98d16e335b1b32209a41b22f08a7e1276d0494b02815d0af8a5ca6b74b729285f8c91068b6b853a4c2dda79c3f7a04e5f9700da193599827

  • \Users\Admin\xaiub.exe

    Filesize

    224KB

    MD5

    9ba467dd45b9944d7527fbf7e3172941

    SHA1

    b33b4b30dc5b853c0e59f2631f31f8992f6a018d

    SHA256

    cd4e0916f0b0c629ee5f63b18e11db3828a1b273ab6102802fcadc4dde9e6c3c

    SHA512

    08eaead62a445fed98d16e335b1b32209a41b22f08a7e1276d0494b02815d0af8a5ca6b74b729285f8c91068b6b853a4c2dda79c3f7a04e5f9700da193599827

  • memory/1404-55-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1404-57-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/1404-65-0x0000000002A00000-0x0000000002A3F000-memory.dmp

    Filesize

    252KB

  • memory/1404-66-0x0000000002A00000-0x0000000002A3F000-memory.dmp

    Filesize

    252KB

  • memory/1404-69-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1660-60-0x0000000000000000-mapping.dmp

  • memory/1660-67-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1660-70-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB