Analysis
-
max time kernel
168s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 02:36
Static task
static1
Behavioral task
behavioral1
Sample
b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe
Resource
win10v2004-20221111-en
General
-
Target
b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe
-
Size
196KB
-
MD5
215417e6ebce886d89cb9a30378f2153
-
SHA1
a1952d92e132af423fe9dbb7ce20e72fc3341ac0
-
SHA256
b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366
-
SHA512
6972ee35480c2cb3b0e0f122bb00cf856e884b771257823b2c2470879ed7d49c81a5e2b859875d66d3f09bd4168b644c5915eb6975d35304713ecb1b32cfada0
-
SSDEEP
3072:W2dVnPybzV8Q3io0ce4LTI208YioBK9QRO8qgXQi:W2VnPybzV8Oio0ctLTt08doLRO8qggi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiocaaf.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 xiocaaf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /R" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /T" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /d" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /E" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /h" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /I" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /z" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /C" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /K" xiocaaf.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /D" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /j" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /S" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /W" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /Z" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /P" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /x" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /n" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /i" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /y" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /L" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /o" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /e" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /f" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /K" b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /l" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /v" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /A" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /H" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /G" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /V" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /u" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /F" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /X" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /r" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /B" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /b" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /Q" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /s" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /k" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /q" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /Y" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /t" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /a" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /w" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /M" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /J" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /O" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /g" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /p" xiocaaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiocaaf = "C:\\Users\\Admin\\xiocaaf.exe /c" xiocaaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe 4516 xiocaaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 4516 xiocaaf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4516 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 88 PID 4296 wrote to memory of 4516 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 88 PID 4296 wrote to memory of 4516 4296 b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe"C:\Users\Admin\AppData\Local\Temp\b45bca68ac2de7f9df32dd5744a762686ccb8afdc92612764541f68d0b5b8366.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\xiocaaf.exe"C:\Users\Admin\xiocaaf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5d389c506b47e2c59e62b66f37f27c270
SHA18c311f417673aa9c124eb1261e193f2c43e66b75
SHA25648e402bfb729cd739ec6f3409eb4fb7297184e5bde7ace54c97be24e44fb9d3d
SHA51238851a9fb07436bcb14eb091e501f90b2d0a0e1c99ffc1b5880d514da1d6fcce2c1469fe925be8f8e3f5ffd6bcf48b20eba069a68da9655c86bdf2961d4d6313
-
Filesize
196KB
MD5d389c506b47e2c59e62b66f37f27c270
SHA18c311f417673aa9c124eb1261e193f2c43e66b75
SHA25648e402bfb729cd739ec6f3409eb4fb7297184e5bde7ace54c97be24e44fb9d3d
SHA51238851a9fb07436bcb14eb091e501f90b2d0a0e1c99ffc1b5880d514da1d6fcce2c1469fe925be8f8e3f5ffd6bcf48b20eba069a68da9655c86bdf2961d4d6313