Analysis

  • max time kernel
    155s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2023 19:51

General

  • Target

    fb0c71d71ee6d447a5c498cd12f4f050_exe32.exe

  • Size

    204KB

  • MD5

    fb0c71d71ee6d447a5c498cd12f4f050

  • SHA1

    c03638ae78e882d1e1b59b5a6654772100bc024b

  • SHA256

    3f101c958bf7aaacfcd0a8285595583282ab9a02df2f98367004edda7eaf7763

  • SHA512

    410eb5cd3bbb328207a47b42b8d7cd5b92e696af0ef0703e4849578a4892be6214113c44e067544e960dd8c39064d2c9e2c1d476e01b369d3fe4199653ec9fb0

  • SSDEEP

    3072:lOmsW8f0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWBc:l5hs4QxL7B9W0c1RCzR/fSmlH

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb0c71d71ee6d447a5c498cd12f4f050_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\fb0c71d71ee6d447a5c498cd12f4f050_exe32.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\xiiol.exe
      "C:\Users\Admin\xiiol.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xiiol.exe

    Filesize

    204KB

    MD5

    4af00e60fd8a2a400f89fc593fb874e7

    SHA1

    38a7910d77fb4ffb00cb3a5b4840dcf4c49d831a

    SHA256

    5e1bb623669349fe572c02b1d950558a29d71522b68a8cf61cda7b0ba2b35814

    SHA512

    b268cd8904148db717190925468900b98d4911fbb8dda6fb2558801245647cb62c11b01cdde5268dd3c63988f112c9fa2dac057999d92687674bf7755b98104f

  • C:\Users\Admin\xiiol.exe

    Filesize

    204KB

    MD5

    4af00e60fd8a2a400f89fc593fb874e7

    SHA1

    38a7910d77fb4ffb00cb3a5b4840dcf4c49d831a

    SHA256

    5e1bb623669349fe572c02b1d950558a29d71522b68a8cf61cda7b0ba2b35814

    SHA512

    b268cd8904148db717190925468900b98d4911fbb8dda6fb2558801245647cb62c11b01cdde5268dd3c63988f112c9fa2dac057999d92687674bf7755b98104f

  • C:\Users\Admin\xiiol.exe

    Filesize

    204KB

    MD5

    4af00e60fd8a2a400f89fc593fb874e7

    SHA1

    38a7910d77fb4ffb00cb3a5b4840dcf4c49d831a

    SHA256

    5e1bb623669349fe572c02b1d950558a29d71522b68a8cf61cda7b0ba2b35814

    SHA512

    b268cd8904148db717190925468900b98d4911fbb8dda6fb2558801245647cb62c11b01cdde5268dd3c63988f112c9fa2dac057999d92687674bf7755b98104f