Analysis
-
max time kernel
177s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 02:55
Static task
static1
Behavioral task
behavioral1
Sample
1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe
Resource
win10v2004-20221111-en
General
-
Target
1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe
-
Size
128KB
-
MD5
03a9254a2e7e8e279b777edf3efb0bad
-
SHA1
bfbf72837913a963410acc01efba0c453b067b7b
-
SHA256
1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91
-
SHA512
eb9cfac732f3136efeca2aac3094acdb9babefc811f558a94efb662f5473b2cd7380e12df00ef54d475735fe59480c2235c6cfb02ba0e857cc0108ce249674cf
-
SSDEEP
3072:6OYyjGDDIuHbomqIQ7Dq7E0zQLQTAEeP0:6PIu7XqIAq7E0zQLgAEB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xczaiw.exe -
Executes dropped EXE 1 IoCs
pid Process 692 xczaiw.exe -
Loads dropped DLL 2 IoCs
pid Process 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /g" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /v" xczaiw.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /t" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /k" xczaiw.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /i" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /h" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /n" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /e" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /f" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /x" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /q" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /p" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /l" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /j" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /y" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /w" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /m" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /u" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /r" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /c" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /a" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /d" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /k" 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /b" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /o" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /s" xczaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xczaiw = "C:\\Users\\Admin\\xczaiw.exe /z" xczaiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe 692 xczaiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 692 xczaiw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 692 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 28 PID 1616 wrote to memory of 692 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 28 PID 1616 wrote to memory of 692 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 28 PID 1616 wrote to memory of 692 1616 1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe"C:\Users\Admin\AppData\Local\Temp\1cb322d6355fdc2499e181422e981aad9815e9b779a8e5dd514abcb01c3b5e91.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\xczaiw.exe"C:\Users\Admin\xczaiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5225a6e9216c8fdb7bd4afee7bb895402
SHA1e534efad271d5566ec67b0f5e28802a221b85568
SHA256046e195e2abec0be836364992fafb670532903bf22e90f8944a4a0cfa6fd9590
SHA5125776b4569ddb9c9a3982d9102c6d3cc7dbd83562daef8f638b0346936c74aac29d548fdad0f88ba874e09d5981f7abecbb219f1b078de60202bf86dc5730d622
-
Filesize
128KB
MD5225a6e9216c8fdb7bd4afee7bb895402
SHA1e534efad271d5566ec67b0f5e28802a221b85568
SHA256046e195e2abec0be836364992fafb670532903bf22e90f8944a4a0cfa6fd9590
SHA5125776b4569ddb9c9a3982d9102c6d3cc7dbd83562daef8f638b0346936c74aac29d548fdad0f88ba874e09d5981f7abecbb219f1b078de60202bf86dc5730d622
-
Filesize
128KB
MD5225a6e9216c8fdb7bd4afee7bb895402
SHA1e534efad271d5566ec67b0f5e28802a221b85568
SHA256046e195e2abec0be836364992fafb670532903bf22e90f8944a4a0cfa6fd9590
SHA5125776b4569ddb9c9a3982d9102c6d3cc7dbd83562daef8f638b0346936c74aac29d548fdad0f88ba874e09d5981f7abecbb219f1b078de60202bf86dc5730d622
-
Filesize
128KB
MD5225a6e9216c8fdb7bd4afee7bb895402
SHA1e534efad271d5566ec67b0f5e28802a221b85568
SHA256046e195e2abec0be836364992fafb670532903bf22e90f8944a4a0cfa6fd9590
SHA5125776b4569ddb9c9a3982d9102c6d3cc7dbd83562daef8f638b0346936c74aac29d548fdad0f88ba874e09d5981f7abecbb219f1b078de60202bf86dc5730d622