Analysis

  • max time kernel
    155s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 20:07

General

  • Target

    45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe

  • Size

    224KB

  • MD5

    74e090438325aaee5b9525c57af1a83f

  • SHA1

    77f92732d6d0e056df76f33d5d5227aa6a2c6c61

  • SHA256

    45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51

  • SHA512

    bd4ea3d4c596bc9ebca77ee606b4e9d17975f41757f442649a93e36b7214d3462bbbc92c4fb52e2e5f426dd7b136bb038670741eb4d24edf67baf381fd3ab63a

  • SSDEEP

    3072:B8G1kBpsZ5qbLj1w+A3W6xNYa7CgPCmHV1BdHDYqzUnQUoflDW:Bdk0qvj1BA7xHCgPCmHV1BdHDYoUgk

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe
    "C:\Users\Admin\AppData\Local\Temp\45a11b39ba46aebbfd9d18dd6512d64ccb05007df35d1388181990786217ca51.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\xoaog.exe
      "C:\Users\Admin\xoaog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xoaog.exe

          Filesize

          224KB

          MD5

          ae8e667d1d78e580f55d20e6fa732e3f

          SHA1

          316a3f1badc10e34abfbb4171cbf0c0f2d477955

          SHA256

          0dc991cfed758d5986f96c3978ebe7e03c74b0a191c48949a4a75ff7acb8a2a3

          SHA512

          885ff5a1207e8883a8f35a88c301863d1f4f80c84010e91507940b08a2a01aa57eff1580793a1645d9b2bbbf369c4b7b1a2c5c6cdb365e81c8fc1c8f88f012fc

        • C:\Users\Admin\xoaog.exe

          Filesize

          224KB

          MD5

          ae8e667d1d78e580f55d20e6fa732e3f

          SHA1

          316a3f1badc10e34abfbb4171cbf0c0f2d477955

          SHA256

          0dc991cfed758d5986f96c3978ebe7e03c74b0a191c48949a4a75ff7acb8a2a3

          SHA512

          885ff5a1207e8883a8f35a88c301863d1f4f80c84010e91507940b08a2a01aa57eff1580793a1645d9b2bbbf369c4b7b1a2c5c6cdb365e81c8fc1c8f88f012fc

        • memory/3820-140-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/3820-142-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/4512-134-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/4512-141-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB