Analysis
-
max time kernel
187s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe
Resource
win10v2004-20221111-en
General
-
Target
841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe
-
Size
80KB
-
MD5
2327f3cacd26bc8017767636d5a4ebf0
-
SHA1
8ce410c1a892b5fec5034cf6a2ad0c0287690510
-
SHA256
841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
-
SHA512
947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7
-
SSDEEP
1536:e33O+wbaj58bavMJgcPWpZTs7OeyDig2mhIXtL4xkpKAv7F9zUlEu7toelfpmX:oVymEJhP6ts7byiAhULn5vh9YlEu7tb0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaohao.exe -
Executes dropped EXE 2 IoCs
pid Process 1484 xaohao.exe 892 xaohao.exe -
Loads dropped DLL 2 IoCs
pid Process 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /q" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /m" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /b" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /t" 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /c" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /o" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /s" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /i" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /n" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /a" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /h" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /r" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /e" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /f" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /l" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /x" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /p" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /g" xaohao.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /u" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /t" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /v" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /j" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /d" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /z" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /k" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /w" xaohao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaohao = "C:\\Users\\Admin\\xaohao.exe /y" xaohao.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xaohao.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum xaohao.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 xaohao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf xaohao.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 948 set thread context of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 1484 set thread context of 892 1484 xaohao.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe 892 xaohao.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 1484 xaohao.exe 892 xaohao.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 948 wrote to memory of 768 948 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 28 PID 768 wrote to memory of 1484 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 29 PID 768 wrote to memory of 1484 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 29 PID 768 wrote to memory of 1484 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 29 PID 768 wrote to memory of 1484 768 841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe 29 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30 PID 1484 wrote to memory of 892 1484 xaohao.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe"C:\Users\Admin\AppData\Local\Temp\841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387.exe712⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\xaohao.exe"C:\Users\Admin\xaohao.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\xaohao.exe714⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD52327f3cacd26bc8017767636d5a4ebf0
SHA18ce410c1a892b5fec5034cf6a2ad0c0287690510
SHA256841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
SHA512947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7
-
Filesize
80KB
MD52327f3cacd26bc8017767636d5a4ebf0
SHA18ce410c1a892b5fec5034cf6a2ad0c0287690510
SHA256841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
SHA512947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7
-
Filesize
80KB
MD52327f3cacd26bc8017767636d5a4ebf0
SHA18ce410c1a892b5fec5034cf6a2ad0c0287690510
SHA256841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
SHA512947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7
-
Filesize
80KB
MD52327f3cacd26bc8017767636d5a4ebf0
SHA18ce410c1a892b5fec5034cf6a2ad0c0287690510
SHA256841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
SHA512947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7
-
Filesize
80KB
MD52327f3cacd26bc8017767636d5a4ebf0
SHA18ce410c1a892b5fec5034cf6a2ad0c0287690510
SHA256841b8f154c80837977d6eaa8d4c4e863044db9e6027cf648cddb416f0ffc5387
SHA512947eee53f77bb9b9015c00041b3927eab70f119707ccea2bd1b8d45df74f011faa48bc44fc1de5040262948636a9a5cb7d51d8172070ef021c808a37994de0a7