Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 18:14

General

  • Target

    f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe

  • Size

    156KB

  • MD5

    c48d0c48b21db1d540c225a87f143361

  • SHA1

    91a704afc313cf41de7e3f43cbbdb61f55dbc28e

  • SHA256

    f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b

  • SHA512

    bebcfd61c614783db173b21f5fd2a15d57190603d5e5732856314a9d1f09df93b60aa01721c402e67f0389c8bb94fa6395df8e02b6ab9c288f7a7cde6d81cc76

  • SSDEEP

    3072:a5/5qj0C0H3RvXs45qlCG8v12aO1AwPgamPet2IZahE5j4oQ:Q5W0Lvulf8v12aO1AwSPetRdd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe
    "C:\Users\Admin\AppData\Local\Temp\f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\xeeyoi.exe
      "C:\Users\Admin\xeeyoi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xeeyoi.exe

    Filesize

    156KB

    MD5

    b3dd0888472be5a6d3fdac43f87a26a5

    SHA1

    8811673d71269bf84418b2fb9c04d19bd56a0da7

    SHA256

    4e81da7c66477028d04660ded0cb1ac21c120d076937fb605d87433009365c10

    SHA512

    04e6024d6e6c6fe13c36ed7516a46ab1206529608eaf986ac7cec8aaeebd1d187ee8379360c5fec9cc691e21be5732f92789897a2c317379ed8b4767c8bd9909

  • C:\Users\Admin\xeeyoi.exe

    Filesize

    156KB

    MD5

    b3dd0888472be5a6d3fdac43f87a26a5

    SHA1

    8811673d71269bf84418b2fb9c04d19bd56a0da7

    SHA256

    4e81da7c66477028d04660ded0cb1ac21c120d076937fb605d87433009365c10

    SHA512

    04e6024d6e6c6fe13c36ed7516a46ab1206529608eaf986ac7cec8aaeebd1d187ee8379360c5fec9cc691e21be5732f92789897a2c317379ed8b4767c8bd9909

  • memory/4988-134-0x0000000000000000-mapping.dmp