Analysis
-
max time kernel
151s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe
Resource
win10v2004-20221111-en
General
-
Target
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe
-
Size
184KB
-
MD5
1a8b313e29f2bc9b504e5a791098ca00
-
SHA1
ba3e5ae42132b7502d8317f726c861f51e9b0af5
-
SHA256
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b
-
SHA512
d577dedd42ad0749bf4d3672084b8b1f475361b516686bd4841dd6752e1a362d31320cb6f3edc99f31d0c8f754eef2bdd71df7351dfe2344a053b78866707465
-
SSDEEP
3072:yGbg+CWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEgS36:eGpz6LKnvmb7/D26yQlw/Lg5qosriHSK
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
xinem.exe3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xinem.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe -
Executes dropped EXE 1 IoCs
Processes:
xinem.exepid process 2036 xinem.exe -
Loads dropped DLL 2 IoCs
Processes:
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exepid process 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
xinem.exe3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /p" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /g" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /V" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /r" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /L" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /s" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /a" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /w" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /C" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /x" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /y" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /c" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /j" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /k" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /q" xinem.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /S" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /l" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /F" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /v" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /f" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /d" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /I" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /e" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /E" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /z" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /M" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /H" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /A" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /m" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /K" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /R" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /U" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /t" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /h" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /G" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /O" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /o" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /b" 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /X" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /n" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /D" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /N" xinem.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /Q" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /J" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /Y" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /Z" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /T" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /W" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /B" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /P" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /i" xinem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xinem = "C:\\Users\\Admin\\xinem.exe /b" xinem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exexinem.exepid process 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe 2036 xinem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exexinem.exepid process 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe 2036 xinem.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exedescription pid process target process PID 1808 wrote to memory of 2036 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe xinem.exe PID 1808 wrote to memory of 2036 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe xinem.exe PID 1808 wrote to memory of 2036 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe xinem.exe PID 1808 wrote to memory of 2036 1808 3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe xinem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe"C:\Users\Admin\AppData\Local\Temp\3dbb4cd375aece7c9d2e3effe23e40eb365db344c4a50f979d240627b1511e6b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\xinem.exe"C:\Users\Admin\xinem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD50fb8c4735b0248839cd7445a65e7ed69
SHA1f99f80790828cde9204ad7a221ef018339f540c7
SHA2568b055e248f55e65464a25c7f7c5db3ad04354ddae48d692e812c5a415a8a1a48
SHA51262b932e9e849d66d6cb7ef28786d4fd8c47a1316a3e0c07cdcdb21c3d255bc7eaa4f110d55ba3c8d4ba4e76e9d836839269b7997959901bb147ca4af7c9c9bbf
-
Filesize
184KB
MD50fb8c4735b0248839cd7445a65e7ed69
SHA1f99f80790828cde9204ad7a221ef018339f540c7
SHA2568b055e248f55e65464a25c7f7c5db3ad04354ddae48d692e812c5a415a8a1a48
SHA51262b932e9e849d66d6cb7ef28786d4fd8c47a1316a3e0c07cdcdb21c3d255bc7eaa4f110d55ba3c8d4ba4e76e9d836839269b7997959901bb147ca4af7c9c9bbf
-
Filesize
184KB
MD50fb8c4735b0248839cd7445a65e7ed69
SHA1f99f80790828cde9204ad7a221ef018339f540c7
SHA2568b055e248f55e65464a25c7f7c5db3ad04354ddae48d692e812c5a415a8a1a48
SHA51262b932e9e849d66d6cb7ef28786d4fd8c47a1316a3e0c07cdcdb21c3d255bc7eaa4f110d55ba3c8d4ba4e76e9d836839269b7997959901bb147ca4af7c9c9bbf
-
Filesize
184KB
MD50fb8c4735b0248839cd7445a65e7ed69
SHA1f99f80790828cde9204ad7a221ef018339f540c7
SHA2568b055e248f55e65464a25c7f7c5db3ad04354ddae48d692e812c5a415a8a1a48
SHA51262b932e9e849d66d6cb7ef28786d4fd8c47a1316a3e0c07cdcdb21c3d255bc7eaa4f110d55ba3c8d4ba4e76e9d836839269b7997959901bb147ca4af7c9c9bbf