Analysis
-
max time kernel
66s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2023 21:14
Behavioral task
behavioral1
Sample
XD_Set-Up.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
XD_Set-Up.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20221111-en
General
-
Target
XD_Set-Up.exe
-
Size
2.7MB
-
MD5
8aca9c821937fc16b0d30ed9cfa231e3
-
SHA1
4c2ed084b9a34077dde546ddefe5fdd6f8a62f12
-
SHA256
ee78b456493f7a9d94d628cf8f8a165ad555721b03f078b76673c24816aca622
-
SHA512
0a1986fb110f8eaccd1c976f025c4c2a95c92da5aedc933e13c5038f4e49a0f5b7e9de727834933b6b2846f10528a7cb212f97377cc03b6da9edef799eb55a18
-
SSDEEP
49152:5GTEMisXVCgvAZ6X/b5Bvd11LkrgCuygbwEF2m8A0:5GIMis04Agz5/L8jkO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2248-132-0x0000000000170000-0x0000000000A58000-memory.dmp upx behavioral2/memory/2248-133-0x0000000000170000-0x0000000000A58000-memory.dmp upx behavioral2/memory/2248-134-0x0000000000170000-0x0000000000A58000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF XD_Set-Up.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 XD_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString XD_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz XD_Set-Up.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XD_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily XD_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName XD_Set-Up.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XD_Set-Up.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION XD_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com XD_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\auth.services.adobe.com\ = "48" XD_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com\Total = "48" XD_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "48" XD_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\auth.services.adobe.com XD_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\XD_Set-Up.exe = "11001" XD_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage XD_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com XD_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com\NumberOfSubdomains = "1" XD_Set-Up.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total XD_Set-Up.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe Token: SeIncreaseQuotaPrivilege 2248 XD_Set-Up.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2248 XD_Set-Up.exe 2248 XD_Set-Up.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XD_Set-Up.exe"C:\Users\Admin\AppData\Local\Temp\XD_Set-Up.exe"1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2248