Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 23:53
Static task
static1
Behavioral task
behavioral1
Sample
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
Resource
win10v2004-20220812-en
General
-
Target
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe
-
Size
260KB
-
MD5
1ee4e2811c7aadbd5f96f7b348888f10
-
SHA1
648b238db02a82b582ace6336bcacba67aeda9f9
-
SHA256
44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b
-
SHA512
b0826d3da562e61068401f5ddfa0177a2070c0a452b2f0b68f140bd56c9ea9d95bba8e5257a6fdba53e20e125daca76b1f7d9a10b565cd80e64b7c16b6b47a9a
-
SSDEEP
3072:8gfAlNfRiIwvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWM:8dJgTSrMaIl/jcLijfHFEHWzXvjT85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xyyaaj.exe -
Executes dropped EXE 1 IoCs
pid Process 732 xyyaaj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /J" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /C" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /A" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /H" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /I" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /f" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /B" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /a" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /c" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /q" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /R" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /m" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /k" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /F" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /v" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /P" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /G" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /O" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /E" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /p" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /s" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /z" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /X" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /Y" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /j" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /t" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /N" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /W" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /y" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /x" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /K" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /d" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /o" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /h" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /b" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /M" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /V" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /r" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /D" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /w" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /i" xyyaaj.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /g" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /n" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /T" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /S" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /l" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /L" xyyaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xyyaaj = "C:\\Users\\Admin\\xyyaaj.exe /Q" xyyaaj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe 732 xyyaaj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4844 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 732 xyyaaj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 732 4844 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 85 PID 4844 wrote to memory of 732 4844 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 85 PID 4844 wrote to memory of 732 4844 44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe"C:\Users\Admin\AppData\Local\Temp\44cc4433a4553bc968c9ecb1036872fbf1d0fd45068d03ab3fe7ab27d9168b4b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\xyyaaj.exe"C:\Users\Admin\xyyaaj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5dc1b1b997a0c881d848fcc64f16faafb
SHA173c636c86c98c6d2e833b599c62815bca8dc4580
SHA256ea74cd70e2ac5235ecadced30b2cc9bdbfb5e0c351327a477d1d23b191f374f6
SHA5124616defa304a51334cad41bfcdaf8e44e535acaa9dc180d6b85e36090b0301c2efb61995b3c30d92dbfc682605ccadaad5a7be90ccf46391a48041bcbeacc7a7
-
Filesize
260KB
MD5dc1b1b997a0c881d848fcc64f16faafb
SHA173c636c86c98c6d2e833b599c62815bca8dc4580
SHA256ea74cd70e2ac5235ecadced30b2cc9bdbfb5e0c351327a477d1d23b191f374f6
SHA5124616defa304a51334cad41bfcdaf8e44e535acaa9dc180d6b85e36090b0301c2efb61995b3c30d92dbfc682605ccadaad5a7be90ccf46391a48041bcbeacc7a7