Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:35

General

  • Target

    64dbd0555bff64544f0a1d773296691e29e49927da77ba9410e351efb55b5147.exe

  • Size

    144KB

  • MD5

    3a34c964fc0e17eea6a09a776c6bcff0

  • SHA1

    9d5e8149940bd1ecb7a7f907241be119bc4dbb65

  • SHA256

    64dbd0555bff64544f0a1d773296691e29e49927da77ba9410e351efb55b5147

  • SHA512

    12de82f52967e7841a2c5062967eceb1f1b7cbb5fff844cd0dcfe46a87f590699be945a61755a1eb594838f4b3c28c79ad6e23c6599d6fa1f115eaeed6286e1f

  • SSDEEP

    3072:NHKFKfj2vhINgVs+Y9YXeKjxF1yj13TWDnt5:NqFUjWq2gYuKjxF1ss

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64dbd0555bff64544f0a1d773296691e29e49927da77ba9410e351efb55b5147.exe
    "C:\Users\Admin\AppData\Local\Temp\64dbd0555bff64544f0a1d773296691e29e49927da77ba9410e351efb55b5147.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\xsjem.exe
      "C:\Users\Admin\xsjem.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4796

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xsjem.exe
    Filesize

    144KB

    MD5

    da7fdf6df4510380f5c849ca5ce74bd9

    SHA1

    fcd39e2cd06991ba3c94bef50f2fd1431032b925

    SHA256

    8152fd86361beefe19c39d9774a833d23d2478817e9439bcab9dacfe66a41187

    SHA512

    63fd8f34121d691a92c223af836488f4e9cd004478465b20224df4df7098e670cfd229723f57eb5e7be1d13de16dd3cb95bf6334b60e54e6eb5dfae3ad72535a

  • C:\Users\Admin\xsjem.exe
    Filesize

    144KB

    MD5

    da7fdf6df4510380f5c849ca5ce74bd9

    SHA1

    fcd39e2cd06991ba3c94bef50f2fd1431032b925

    SHA256

    8152fd86361beefe19c39d9774a833d23d2478817e9439bcab9dacfe66a41187

    SHA512

    63fd8f34121d691a92c223af836488f4e9cd004478465b20224df4df7098e670cfd229723f57eb5e7be1d13de16dd3cb95bf6334b60e54e6eb5dfae3ad72535a

  • memory/4796-134-0x0000000000000000-mapping.dmp