Analysis
-
max time kernel
155s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe
Resource
win10v2004-20220812-en
General
-
Target
45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe
-
Size
224KB
-
MD5
74e090438325aaee5b9525c57af1a83f
-
SHA1
77f92732d6d0e056df76f33d5d5227aa6a2c6c61
-
SHA256
45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51
-
SHA512
bd4ea3d4c596bc9ebca77ee606b4e9d17975f41757f442649a93e36b7214d3462bbbc92c4fb52e2e5f426dd7b136bb038670741eb4d24edf67baf381fd3ab63a
-
SSDEEP
3072:B8G1kBpsZ5qbLj1w+A3W6xNYa7CgPCmHV1BdHDYqzUnQUoflDW:Bdk0qvj1BA7xHCgPCmHV1BdHDYoUgk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoaog.exe -
Executes dropped EXE 1 IoCs
pid Process 3820 xoaog.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /E" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /l" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /G" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /n" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /h" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /L" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /p" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /O" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /f" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /M" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /W" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /z" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /r" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /m" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /H" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /a" xoaog.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /S" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /q" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /s" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /F" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /X" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /c" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /i" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /A" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /B" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /Z" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /Y" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /v" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /K" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /g" xoaog.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /y" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /x" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /Q" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /I" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /k" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /N" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /b" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /R" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /w" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /J" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /C" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /T" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /o" 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /d" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /j" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /D" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /e" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /U" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /P" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /u" xoaog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoaog = "C:\\Users\\Admin\\xoaog.exe /V" xoaog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe 3820 xoaog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 3820 xoaog.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3820 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 83 PID 4512 wrote to memory of 3820 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 83 PID 4512 wrote to memory of 3820 4512 45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe"C:\Users\Admin\AppData\Local\Temp\45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\xoaog.exe"C:\Users\Admin\xoaog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ae8e667d1d78e580f55d20e6fa732e3f
SHA1316a3f1badc10e34abfbb4171cbf0c0f2d477955
SHA2560dc991cfed758d5986f96c3978ebe7e03c74b0a191c48949a4a75ff7acb8a2a3
SHA512885ff5a1207e8883a8f35a88c301863d1f4f80c84010e91507940b08a2a01aa57eff1580793a1645d9b2bbbf369c4b7b1a2c5c6cdb365e81c8fc1c8f88f012fc
-
Filesize
224KB
MD5ae8e667d1d78e580f55d20e6fa732e3f
SHA1316a3f1badc10e34abfbb4171cbf0c0f2d477955
SHA2560dc991cfed758d5986f96c3978ebe7e03c74b0a191c48949a4a75ff7acb8a2a3
SHA512885ff5a1207e8883a8f35a88c301863d1f4f80c84010e91507940b08a2a01aa57eff1580793a1645d9b2bbbf369c4b7b1a2c5c6cdb365e81c8fc1c8f88f012fc