Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
29010e15cce2beb45fa35c79a754ed83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29010e15cce2beb45fa35c79a754ed83.exe
Resource
win10v2004-20231215-en
General
-
Target
29010e15cce2beb45fa35c79a754ed83.exe
-
Size
134KB
-
MD5
29010e15cce2beb45fa35c79a754ed83
-
SHA1
13a46acc96de386e6981c685dbaa80f3aaac411c
-
SHA256
65bcfd513e062a990d1e074e43f37bc8d8a5336fbb2d9b99f0ec4654c5d8ea6f
-
SHA512
f4940421c308e1bb1db86df1f4f7efa53ac99b010536c2b96c67609af58159bd777a1426ed61ce12def686fa7dc790a255920ea71514a70a72da9a531bb08d37
-
SSDEEP
3072:S9Zu1RZHR4++Tz3saVFJjO6cbsCuCsywO/FzdXr:S9Zu1G/zjO6HWo+X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 Xvodoa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\W1WIWQ1NPG = "C:\\Windows\\Xvodoa.exe" Xvodoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 29010e15cce2beb45fa35c79a754ed83.exe File created C:\Windows\Xvodoa.exe 29010e15cce2beb45fa35c79a754ed83.exe File opened for modification C:\Windows\Xvodoa.exe 29010e15cce2beb45fa35c79a754ed83.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 29010e15cce2beb45fa35c79a754ed83.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Xvodoa.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International Xvodoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe 2716 Xvodoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28 PID 2508 wrote to memory of 2716 2508 29010e15cce2beb45fa35c79a754ed83.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\29010e15cce2beb45fa35c79a754ed83.exe"C:\Users\Admin\AppData\Local\Temp\29010e15cce2beb45fa35c79a754ed83.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Xvodoa.exeC:\Windows\Xvodoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD531d95fac4414fb8380fb152f7a7e821e
SHA1cc6cd8723969ad37fe165551450495ed89546dba
SHA256ccb615f118a06c2c9ba0768358e323d8d8e6de5f838aea5b6ac7024ed974e4c4
SHA5122a5ae5a084007edd9fb4600b0aca939e64e53c90f09bc14a8cac1704854367ccfc1cd99b235e01fe666d0bfd236923813e55f0eb56be200514facd55e8767a88
-
Filesize
134KB
MD529010e15cce2beb45fa35c79a754ed83
SHA113a46acc96de386e6981c685dbaa80f3aaac411c
SHA25665bcfd513e062a990d1e074e43f37bc8d8a5336fbb2d9b99f0ec4654c5d8ea6f
SHA512f4940421c308e1bb1db86df1f4f7efa53ac99b010536c2b96c67609af58159bd777a1426ed61ce12def686fa7dc790a255920ea71514a70a72da9a531bb08d37