Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 19:21

General

  • Target

    377fb5b9927f8cc715f50135ee8476ff.exe

  • Size

    60KB

  • MD5

    377fb5b9927f8cc715f50135ee8476ff

  • SHA1

    341d665d4cc4cf180fff3d2cbfa0e736bdc42b1c

  • SHA256

    49c431300ae3b78261953c4f7245322bb00db2a4abca89b8b7801ace563069ad

  • SHA512

    0bba1c1f7aad702c56ad0dda3d246830ef8af129eada9a5b26f10110092c89fae2b0e4c55d1e615b54027bec3eb42f8ba57abd7109f0a993891dd3ad6404345f

  • SSDEEP

    768:Xtxv08WLZa3RHZLm+UMLZztz7GIcFIk2d+6FIkRcUNKe12zCYn6Y72vspG6P8Lx0:X378G+5+0ZdLwapNMiB0FUP6D5DL+1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\377fb5b9927f8cc715f50135ee8476ff.exe
    "C:\Users\Admin\AppData\Local\Temp\377fb5b9927f8cc715f50135ee8476ff.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Users\Admin\xaido.exe
      "C:\Users\Admin\xaido.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xaido.exe

          Filesize

          60KB

          MD5

          34850b1d7d68ca856a4ce5dc27f2cfb4

          SHA1

          fa90e25c2aac404014534be274a4559f0fda7d3b

          SHA256

          7008f2d41b78f9fa3a565fbd2f7f0ddeac3b24373a4b73f7a08cc1f8d3f0db97

          SHA512

          35b1d3eaa45e0e1137d4d5e4ceb71d4d37c25dfb33ab0ef3b4b5953adb6810a397b1c4779a7723b41fe5c9357b49030a8954b2cfbd75c3cac7c00f684a975de2