Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 18:14
Static task
static1
Behavioral task
behavioral1
Sample
f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe
Resource
win10v2004-20220812-en
General
-
Target
f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe
-
Size
156KB
-
MD5
c48d0c48b21db1d540c225a87f143361
-
SHA1
91a704afc313cf41de7e3f43cbbdb61f55dbc28e
-
SHA256
f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b
-
SHA512
bebcfd61c614783db173b21f5fd2a15d57190603d5e5732856314a9d1f09df93b60aa01721c402e67f0389c8bb94fa6395df8e02b6ab9c288f7a7cde6d81cc76
-
SSDEEP
3072:a5/5qj0C0H3RvXs45qlCG8v12aO1AwPgamPet2IZahE5j4oQ:Q5W0Lvulf8v12aO1AwSPetRdd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeeyoi.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 xeeyoi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /H" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /j" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /t" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /Z" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /l" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /K" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /s" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /W" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /G" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /m" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /N" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /T" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /e" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /b" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /E" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /M" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /D" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /a" xeeyoi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /g" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /P" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /S" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /i" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /y" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /A" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /n" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /x" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /R" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /p" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /O" f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /O" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /o" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /f" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /k" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /U" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /w" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /Y" xeeyoi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /B" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /F" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /I" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /c" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /h" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /X" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /C" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /Q" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /r" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /v" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /L" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /d" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /q" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /J" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /z" xeeyoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeyoi = "C:\\Users\\Admin\\xeeyoi.exe /u" xeeyoi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe 4988 xeeyoi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 4988 xeeyoi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4988 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 82 PID 4528 wrote to memory of 4988 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 82 PID 4528 wrote to memory of 4988 4528 f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe"C:\Users\Admin\AppData\Local\Temp\f64fe3a9122d0eee681e58d5f65ace09a6e2dfe55268674bfcf374325bdba96b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\xeeyoi.exe"C:\Users\Admin\xeeyoi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5b3dd0888472be5a6d3fdac43f87a26a5
SHA18811673d71269bf84418b2fb9c04d19bd56a0da7
SHA2564e81da7c66477028d04660ded0cb1ac21c120d076937fb605d87433009365c10
SHA51204e6024d6e6c6fe13c36ed7516a46ab1206529608eaf986ac7cec8aaeebd1d187ee8379360c5fec9cc691e21be5732f92789897a2c317379ed8b4767c8bd9909
-
Filesize
156KB
MD5b3dd0888472be5a6d3fdac43f87a26a5
SHA18811673d71269bf84418b2fb9c04d19bd56a0da7
SHA2564e81da7c66477028d04660ded0cb1ac21c120d076937fb605d87433009365c10
SHA51204e6024d6e6c6fe13c36ed7516a46ab1206529608eaf986ac7cec8aaeebd1d187ee8379360c5fec9cc691e21be5732f92789897a2c317379ed8b4767c8bd9909