Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:35
Static task
static1
Behavioral task
behavioral1
Sample
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe
Resource
win10v2004-20221111-en
General
-
Target
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe
-
Size
86KB
-
MD5
3f25a9df421a1e1b36b168aab21edf50
-
SHA1
5779cd669174db5dd0e171325c4d9877f7a5eb74
-
SHA256
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
-
SHA512
decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7
-
SSDEEP
1536:iA/zYY2EoHzHoZANS9FwW6LygnzFL3RRpEqJ4fSaOWyzMmAzz9TyHPib:OYdOzHo6NYQe25LVEPflty/whyvib
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiozob.exe -
Executes dropped EXE 2 IoCs
Processes:
xiozob.exexiozob.exepid process 1576 xiozob.exe 1512 xiozob.exe -
Loads dropped DLL 2 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exepid process 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
xiozob.exe4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /l" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /v" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /y" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /l" 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /e" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /n" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /m" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /h" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /r" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /c" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /p" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /x" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /i" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /s" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /q" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /d" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /w" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /a" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /j" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /g" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /z" xiozob.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /t" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /u" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /o" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /f" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /b" xiozob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiozob = "C:\\Users\\Admin\\xiozob.exe /k" xiozob.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum xiozob.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 xiozob.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
xiozob.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf xiozob.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exedescription pid process target process PID 1652 set thread context of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1576 set thread context of 1512 1576 xiozob.exe xiozob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exepid process 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe 1512 xiozob.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exexiozob.exepid process 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 1576 xiozob.exe 1512 xiozob.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exexiozob.exedescription pid process target process PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1652 wrote to memory of 1224 1652 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe PID 1224 wrote to memory of 1576 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe xiozob.exe PID 1224 wrote to memory of 1576 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe xiozob.exe PID 1224 wrote to memory of 1576 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe xiozob.exe PID 1224 wrote to memory of 1576 1224 4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe PID 1576 wrote to memory of 1512 1576 xiozob.exe xiozob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe"C:\Users\Admin\AppData\Local\Temp\4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\4cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8.exe752⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\xiozob.exe"C:\Users\Admin\xiozob.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\xiozob.exe754⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53f25a9df421a1e1b36b168aab21edf50
SHA15779cd669174db5dd0e171325c4d9877f7a5eb74
SHA2564cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
SHA512decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7
-
Filesize
86KB
MD53f25a9df421a1e1b36b168aab21edf50
SHA15779cd669174db5dd0e171325c4d9877f7a5eb74
SHA2564cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
SHA512decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7
-
Filesize
86KB
MD53f25a9df421a1e1b36b168aab21edf50
SHA15779cd669174db5dd0e171325c4d9877f7a5eb74
SHA2564cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
SHA512decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7
-
Filesize
86KB
MD53f25a9df421a1e1b36b168aab21edf50
SHA15779cd669174db5dd0e171325c4d9877f7a5eb74
SHA2564cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
SHA512decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7
-
Filesize
86KB
MD53f25a9df421a1e1b36b168aab21edf50
SHA15779cd669174db5dd0e171325c4d9877f7a5eb74
SHA2564cf2ab9038e17e5e0544c55e47b9bd488d8fa032d47c77594a278035fe75fca8
SHA512decb159afdd7d0a99a1d66c08575044023c75ed3f229fec56a546c1b9e493d26c046921b2aff29da781c2d6f0df9acca81bcafd04915ad9c2fe290df07e0cff7