Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
Resource
win10v2004-20220812-en
General
-
Target
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
-
Size
156KB
-
MD5
b71556d10a83e5cf5465c24f2f6ea227
-
SHA1
a7afd982790a3a83d1810895af1d8e2f5045890b
-
SHA256
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048
-
SHA512
e01b13410e695dc9b5278513dde8dd61a41156eb584f31e449f745c5d66d32f87b17e0a77a03531d5a58a969e8a6dad0845b188cc4885f7931da6c17c17ca2b3
-
SSDEEP
1536:MGan4ngzp0B8yNuRe305Xrud5N9jRMmBUKH7zD87/u+JcBqVbv1BsbhbEle+RReZ:iogexufubFKVXcBqB1BGSjNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiwij.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 xiwij.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /e" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /c" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /b" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /v" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /m" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /u" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /d" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /a" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /q" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /p" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /j" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /h" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /x" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /n" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /z" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /r" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /l" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /i" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /w" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /g" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /s" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /j" a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /k" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /o" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /f" xiwij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /y" xiwij.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiwij = "C:\\Users\\Admin\\xiwij.exe /t" xiwij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe 2300 xiwij.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 2300 xiwij.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2300 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 79 PID 2424 wrote to memory of 2300 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 79 PID 2424 wrote to memory of 2300 2424 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe"C:\Users\Admin\AppData\Local\Temp\a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\xiwij.exe"C:\Users\Admin\xiwij.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD50cc4932ac801577200b306719c7ae4d2
SHA1dd437048c45d228efeb584b7be447097b9289488
SHA256ac53a15d574ff350efc779a3f402b17e3c6bf4a15f7a30f17739b14cc0a26870
SHA5121928bd35a27ec98f8525d8d93a41868e9961969b9a1e39a19cc97d24792459ad5109280a9608f2621197254348813381f2d3f7111f8a929629a973a6bc0d82c3
-
Filesize
156KB
MD50cc4932ac801577200b306719c7ae4d2
SHA1dd437048c45d228efeb584b7be447097b9289488
SHA256ac53a15d574ff350efc779a3f402b17e3c6bf4a15f7a30f17739b14cc0a26870
SHA5121928bd35a27ec98f8525d8d93a41868e9961969b9a1e39a19cc97d24792459ad5109280a9608f2621197254348813381f2d3f7111f8a929629a973a6bc0d82c3