Analysis
-
max time kernel
152s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe
Resource
win10v2004-20221111-en
General
-
Target
c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe
-
Size
172KB
-
MD5
5ac49f82554ad9564a271a91114df8f7
-
SHA1
93df5144b0b683c7a72c3d87a364d4176ca14b83
-
SHA256
c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281
-
SHA512
e25cf8aa29619097ff0affc898620f1aa8524a27a963a2e378df340ee7a1f57fbb38c1d1482d69793e0580477f828060637452501d858c2efa8d149493fa1c4c
-
SSDEEP
3072:7A3QXXeRgw3tiKnvmb7/D26nYNpnHzqTT8RUFwjkKvLg3dvCgIHzmWZAlGbB6iBz:8AXXeR1UKnvmb7/D26nSnTqTT8RUFwjR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaemii.exe -
Executes dropped EXE 1 IoCs
pid Process 1096 xaemii.exe -
Loads dropped DLL 2 IoCs
pid Process 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /x" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /U" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /R" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /t" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /k" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /d" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /v" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /r" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /w" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /H" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /Y" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /K" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /L" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /m" c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /h" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /O" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /j" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /y" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /g" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /f" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /N" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /q" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /c" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /C" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /J" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /z" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /u" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /i" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /l" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /a" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /e" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /Q" xaemii.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /X" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /E" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /V" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /W" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /o" xaemii.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /F" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /M" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /B" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /P" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /G" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /D" xaemii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaemii = "C:\\Users\\Admin\\xaemii.exe /Z" xaemii.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe 1096 xaemii.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 1096 xaemii.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1096 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 28 PID 1792 wrote to memory of 1096 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 28 PID 1792 wrote to memory of 1096 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 28 PID 1792 wrote to memory of 1096 1792 c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe"C:\Users\Admin\AppData\Local\Temp\c56b717e449373b41412e130631daeeece9c2c03e311ad55508a6cf9914d9281.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\xaemii.exe"C:\Users\Admin\xaemii.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD56e6b89cce3aee6ab5e39d1234eb5826f
SHA164da587993e514d4e3445e3d3e66582217731df7
SHA256038712225c2d5628663827a41a8a03910b1babc425299d6958b46060b0ece1fe
SHA512a8e3b9123a2d1cb37a0af77bf8c4d32fde172b024b160402a139d958bc476301ed5d97cba65f9760ca3b973dde81b8835a7d8351bf8236da524a236b826619b8
-
Filesize
172KB
MD56e6b89cce3aee6ab5e39d1234eb5826f
SHA164da587993e514d4e3445e3d3e66582217731df7
SHA256038712225c2d5628663827a41a8a03910b1babc425299d6958b46060b0ece1fe
SHA512a8e3b9123a2d1cb37a0af77bf8c4d32fde172b024b160402a139d958bc476301ed5d97cba65f9760ca3b973dde81b8835a7d8351bf8236da524a236b826619b8
-
Filesize
172KB
MD56e6b89cce3aee6ab5e39d1234eb5826f
SHA164da587993e514d4e3445e3d3e66582217731df7
SHA256038712225c2d5628663827a41a8a03910b1babc425299d6958b46060b0ece1fe
SHA512a8e3b9123a2d1cb37a0af77bf8c4d32fde172b024b160402a139d958bc476301ed5d97cba65f9760ca3b973dde81b8835a7d8351bf8236da524a236b826619b8
-
Filesize
172KB
MD56e6b89cce3aee6ab5e39d1234eb5826f
SHA164da587993e514d4e3445e3d3e66582217731df7
SHA256038712225c2d5628663827a41a8a03910b1babc425299d6958b46060b0ece1fe
SHA512a8e3b9123a2d1cb37a0af77bf8c4d32fde172b024b160402a139d958bc476301ed5d97cba65f9760ca3b973dde81b8835a7d8351bf8236da524a236b826619b8