Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 00:24

General

  • Target

    a1ff8eb2195b02abfaf4966ce4bb92a546849cdeca9284af2045b52fc4cd9712.exe

  • Size

    180KB

  • MD5

    a4875c57a3388602eb7ed7568bf8600e

  • SHA1

    80966c5a16196da7eb2b092f3ebcc7f22aab126a

  • SHA256

    a1ff8eb2195b02abfaf4966ce4bb92a546849cdeca9284af2045b52fc4cd9712

  • SHA512

    2074499d3c7febd6780c050237502d7a49775b4d431f8e4154a4f756fa717a75a56b2a16ad87e4ef7f07d7ea6217c206f8985863c2aa6aa49c743391e77c153b

  • SSDEEP

    3072:JygdVAXY71idPAaWELGzMshNXTDFE+7jF6XTjwv:JygzAY+oXqFshNTDT756XTY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1ff8eb2195b02abfaf4966ce4bb92a546849cdeca9284af2045b52fc4cd9712.exe
    "C:\Users\Admin\AppData\Local\Temp\a1ff8eb2195b02abfaf4966ce4bb92a546849cdeca9284af2045b52fc4cd9712.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\xaaov.exe
      "C:\Users\Admin\xaaov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaaov.exe

    Filesize

    180KB

    MD5

    57fb89bb20d3fe08d5af5cda283d3930

    SHA1

    bb2fc57431685dac279c8deb912a2eddb1cd97d9

    SHA256

    9c39c894a149f1ee920eec6c784892dea8caf6aa08b77ff8f22095baad77e1a9

    SHA512

    e66665d7aa54d00e7ee5e852e089305ace57593e8d3caa57f9b5678857a76ec6ef3e0d63c7ae063f233b6ae9d8b4f9bddb89a45a7ed6a668078ad09a75723edd

  • C:\Users\Admin\xaaov.exe

    Filesize

    180KB

    MD5

    57fb89bb20d3fe08d5af5cda283d3930

    SHA1

    bb2fc57431685dac279c8deb912a2eddb1cd97d9

    SHA256

    9c39c894a149f1ee920eec6c784892dea8caf6aa08b77ff8f22095baad77e1a9

    SHA512

    e66665d7aa54d00e7ee5e852e089305ace57593e8d3caa57f9b5678857a76ec6ef3e0d63c7ae063f233b6ae9d8b4f9bddb89a45a7ed6a668078ad09a75723edd