Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 10:14

General

  • Target

    33720b7fc90e38510feec2b17820994f0daeffa9427c787f68ff438314c0f72e.exe

  • Size

    268KB

  • MD5

    57a5355c87c188fbe9fa3ee40ed7fd88

  • SHA1

    5923031f16c2f618584d3471acc7a316e03d77be

  • SHA256

    33720b7fc90e38510feec2b17820994f0daeffa9427c787f68ff438314c0f72e

  • SHA512

    17f8b7ff4536497c764fad9c6a78471091f76a2f3c06646aa07d2486f2a6ed70ea7d750e50bd94484ad5c402bfe9f75f0e4d862eb00e9aa8c44e4799d3b3b6c5

  • SSDEEP

    3072:tE4rqlnywAdasPUTVY7fhINP7JbfLBsyVEJ8Ixjtmkp44upWuTNgX8Tjee/L1p3h:KMftsgfuNPp5VEVtmk4DAuTxeO3h

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33720b7fc90e38510feec2b17820994f0daeffa9427c787f68ff438314c0f72e.exe
    "C:\Users\Admin\AppData\Local\Temp\33720b7fc90e38510feec2b17820994f0daeffa9427c787f68ff438314c0f72e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\xawov.exe
      "C:\Users\Admin\xawov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xawov.exe

    Filesize

    268KB

    MD5

    aee2bab3470d068452838e5714cf43c5

    SHA1

    b4e7e67f88bebe4e7410993dd147be35641a1180

    SHA256

    9e544ec47c624f6d454eaef222896c0f35dd1e6c2918450d070b9a19f218eb11

    SHA512

    3a63a5263efb931e7ff176957cb4fc9c8d37e5c067f1bcf6fe891e4f87c7718844b7ddf7e6f8295618b224917a08b3972cabc5231c06a3d47901b9179e66fa94

  • C:\Users\Admin\xawov.exe

    Filesize

    268KB

    MD5

    aee2bab3470d068452838e5714cf43c5

    SHA1

    b4e7e67f88bebe4e7410993dd147be35641a1180

    SHA256

    9e544ec47c624f6d454eaef222896c0f35dd1e6c2918450d070b9a19f218eb11

    SHA512

    3a63a5263efb931e7ff176957cb4fc9c8d37e5c067f1bcf6fe891e4f87c7718844b7ddf7e6f8295618b224917a08b3972cabc5231c06a3d47901b9179e66fa94

  • memory/1476-134-0x0000000000000000-mapping.dmp