Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 17:23
Static task
static1
Behavioral task
behavioral1
Sample
9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe
Resource
win10v2004-20221111-en
General
-
Target
9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe
-
Size
200KB
-
MD5
df80a50dd5348230451d512f1c43c21d
-
SHA1
c52c7ad5ad61733af6df571bae0297b11836099d
-
SHA256
9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3
-
SHA512
5fe96cecba3702d8322b79e11c8901e8c0f1712980183f1490426bc17964284310262e1df62e3d3a05b96230e874afc7b4c5662e366a85ce3b7da8a875e9ec7d
-
SSDEEP
1536:MWKgsj6RfSJ1tx1xCzxNy3tQ9CW5EZWHakMwP9W6uXN993ZNxtFnqlGcNskVatM7:Fy6RfSJG0tQ9nLHbB9WF478dDVBm4bgP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xstoin.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 xstoin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /c" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /g" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /x" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /o" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /r" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /b" xstoin.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /h" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /w" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /y" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /k" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /n" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /m" xstoin.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /q" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /p" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /a" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /t" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /z" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /d" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /v" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /f" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /l" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /j" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /s" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /i" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /e" xstoin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /a" 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xstoin = "C:\\Users\\Admin\\xstoin.exe /u" xstoin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe 2008 xstoin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 2008 xstoin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2008 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 84 PID 1052 wrote to memory of 2008 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 84 PID 1052 wrote to memory of 2008 1052 9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe"C:\Users\Admin\AppData\Local\Temp\9e8bbec2a2950b0c1659f86a1c2ac6b5f877dd0da5d23bd37557fdd2f73eb4a3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\xstoin.exe"C:\Users\Admin\xstoin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD51ac2bf724980dbecf7e3b38c5d8cd20b
SHA157a2fa5a19a395df2cb3811adf4fbc08f8381616
SHA25698ed07f6ba80443fb4fa069be3465bc7e85001eb9c28793b61f7c6244af85221
SHA512a6ebede799aeee62f4726e0695cb814c887968e8835e3c56f77db457ec5d571460f46de16c9789ac432aea440576c5b5ef3ae9204f25357d9d68982ae9c702fe
-
Filesize
200KB
MD51ac2bf724980dbecf7e3b38c5d8cd20b
SHA157a2fa5a19a395df2cb3811adf4fbc08f8381616
SHA25698ed07f6ba80443fb4fa069be3465bc7e85001eb9c28793b61f7c6244af85221
SHA512a6ebede799aeee62f4726e0695cb814c887968e8835e3c56f77db457ec5d571460f46de16c9789ac432aea440576c5b5ef3ae9204f25357d9d68982ae9c702fe