Analysis
-
max time kernel
153s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe
Resource
win10v2004-20221111-en
General
-
Target
c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe
-
Size
192KB
-
MD5
49a66d018b361cad503fb8c8a170ebd2
-
SHA1
c631df32bf1047b157648f3ec738633041f1016e
-
SHA256
c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc
-
SHA512
1a34efeda1e7ddd1dac8595584d9896777ff15fd0ea4982ca5d93f8506578bba44d02f2a24a154a922ef46d0be4a76100e1695bce5b6d240adec3948d0d181a1
-
SSDEEP
3072:rtrZuCWv2JQcFBKBJy6apbuD2VMbj1hlUyw/1obo:rzBWvUFIJlapu2V21r/Y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoiobe.exe -
Executes dropped EXE 1 IoCs
pid Process 888 xoiobe.exe -
Loads dropped DLL 2 IoCs
pid Process 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe -
Adds Run key to start application 2 TTPs 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /g" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /k" xoiobe.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /j" c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /M" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /i" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /E" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /H" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /V" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /p" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /C" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /F" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /B" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /K" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /P" xoiobe.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /G" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /y" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /s" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /f" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /L" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /j" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /x" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /e" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /T" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /q" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /U" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /d" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /v" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /N" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /h" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /O" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /J" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /b" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /Q" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /S" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /A" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /r" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /W" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /w" xoiobe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiobe = "C:\\Users\\Admin\\xoiobe.exe /m" xoiobe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe 888 xoiobe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 888 xoiobe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 888 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 28 PID 1104 wrote to memory of 888 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 28 PID 1104 wrote to memory of 888 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 28 PID 1104 wrote to memory of 888 1104 c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe"C:\Users\Admin\AppData\Local\Temp\c012f53dd959f7525def5990b132e55c73c5f288eb1cbeb75fe40451e50831dc.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\xoiobe.exe"C:\Users\Admin\xoiobe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD57237dbe73e0be95bb7fc824104cb1c6f
SHA16cd649cabf90f06b1369f488b25c5118c4095c40
SHA25617ec646e8bc06ed5d808c1a88e3044247f5dac23c096a31e4bb7dc613f5d9c5b
SHA5121500db88e2a138c719958b76fa7f4cd8008dbcaa12fcd2ca5ec3a59790b6d3cf2bb3282fac6d03cc1a308d3165edba25d7f7a9b3219b53c171611837346b4b63
-
Filesize
192KB
MD57237dbe73e0be95bb7fc824104cb1c6f
SHA16cd649cabf90f06b1369f488b25c5118c4095c40
SHA25617ec646e8bc06ed5d808c1a88e3044247f5dac23c096a31e4bb7dc613f5d9c5b
SHA5121500db88e2a138c719958b76fa7f4cd8008dbcaa12fcd2ca5ec3a59790b6d3cf2bb3282fac6d03cc1a308d3165edba25d7f7a9b3219b53c171611837346b4b63
-
Filesize
192KB
MD57237dbe73e0be95bb7fc824104cb1c6f
SHA16cd649cabf90f06b1369f488b25c5118c4095c40
SHA25617ec646e8bc06ed5d808c1a88e3044247f5dac23c096a31e4bb7dc613f5d9c5b
SHA5121500db88e2a138c719958b76fa7f4cd8008dbcaa12fcd2ca5ec3a59790b6d3cf2bb3282fac6d03cc1a308d3165edba25d7f7a9b3219b53c171611837346b4b63
-
Filesize
192KB
MD57237dbe73e0be95bb7fc824104cb1c6f
SHA16cd649cabf90f06b1369f488b25c5118c4095c40
SHA25617ec646e8bc06ed5d808c1a88e3044247f5dac23c096a31e4bb7dc613f5d9c5b
SHA5121500db88e2a138c719958b76fa7f4cd8008dbcaa12fcd2ca5ec3a59790b6d3cf2bb3282fac6d03cc1a308d3165edba25d7f7a9b3219b53c171611837346b4b63