Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 02:48
Static task
static1
Behavioral task
behavioral1
Sample
20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe
Resource
win10v2004-20220901-en
General
-
Target
20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe
-
Size
320KB
-
MD5
45143b5cbfac2ae07a8141c131d174cb
-
SHA1
cc9737f24163d9113b6941513d14fc49a2bad178
-
SHA256
20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5
-
SHA512
a1b828abc6b60757052fd847e27bd753acc38b9e0f51990612675c3a1f93d4ec2bd7bc7e2fe4bae9cc8699d56ee05b65e03530a5d343383cab87bdc4d721bff1
-
SSDEEP
6144:0tpYwn/ze9c0MCQ8rOHnB2gXr2i+y6VPuGrtzcSX6tzLDTH5YfJpf2ru9c9TKHUW:EZLdCQ8rKTH5YfJpf2ru9c9TK0sVCWpT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuozax.exe -
Executes dropped EXE 1 IoCs
pid Process 3708 xuozax.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /z" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /p" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /d" 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /q" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /g" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /a" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /c" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /f" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /y" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /i" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /t" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /s" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /d" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /h" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /v" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /k" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /r" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /e" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /n" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /u" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /l" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /o" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /x" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /b" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /m" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /j" xuozax.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuozax = "C:\\Users\\Admin\\xuozax.exe /w" xuozax.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xuozax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe 3708 xuozax.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 3708 xuozax.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3708 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 81 PID 2632 wrote to memory of 3708 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 81 PID 2632 wrote to memory of 3708 2632 20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe"C:\Users\Admin\AppData\Local\Temp\20431e7833a5d6ce1212dc588249ef58223fe3b01b5b0160c528bcb2967e7cb5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\xuozax.exe"C:\Users\Admin\xuozax.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5c50d1e7c51c817f3d7b2886ff51e665b
SHA1f7ade9d1af2e791dc4688c14047c1d46a346dc26
SHA25634cf164258a6a100d38022e564fb6017d484296aeb000a65122f318a2382aae1
SHA512c063ebb92438eaaa1de6967e86f9ac153989485f679fb64fefd3ed36f8183dac189e052da46fbd87f76f493aa05b1d0fdede8220964b0bf49246f37408224a1d
-
Filesize
320KB
MD5c50d1e7c51c817f3d7b2886ff51e665b
SHA1f7ade9d1af2e791dc4688c14047c1d46a346dc26
SHA25634cf164258a6a100d38022e564fb6017d484296aeb000a65122f318a2382aae1
SHA512c063ebb92438eaaa1de6967e86f9ac153989485f679fb64fefd3ed36f8183dac189e052da46fbd87f76f493aa05b1d0fdede8220964b0bf49246f37408224a1d