Analysis

  • max time kernel
    203s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 09:24

General

  • Target

    6384c77011929f08660f14c72f762527.exe

  • Size

    244KB

  • MD5

    6384c77011929f08660f14c72f762527

  • SHA1

    163e2c4dee6c3d2d4c0cc42be0ed9013ad0a789e

  • SHA256

    4a1e1149116c1ff68358a2c8c804bda2055d0b9adba08c2f2558e2aefe3ac78c

  • SHA512

    dcdebc10da30cac2bb3952d6f942cf0b86ea568b5a040ce8748e09ac4f705f32e86a0cb6b395bec7d6b9b003981d98c56a082472c417b8d02e3899c3cda5d45c

  • SSDEEP

    3072:7hPBdBsROnFQroR5yIuSP9lqVinU3bp/PTm2moJ6BwA+GABMndgSqrr:7hJdV7PnqVinU3bw2moJ6WAdgB3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6384c77011929f08660f14c72f762527.exe
    "C:\Users\Admin\AppData\Local\Temp\6384c77011929f08660f14c72f762527.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\xiror.exe
      "C:\Users\Admin\xiror.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xiror.exe

    Filesize

    244KB

    MD5

    a2119b0e7332ca8d43baaf7b4eb0f124

    SHA1

    f2044f9a7177ce614900e5aa1211ccafb0941c8c

    SHA256

    3f3ba7f0b2d93fbfc06a5b0015a9233202e84ebe917bf2cd9da518e220ac6ed1

    SHA512

    210f3cb55c9819ccae02a6e4b29d44ea874782ca0d186cf96e98a12c38d565cbb5324e9a3ad8a926e1becab4470433fe9fb22ed46d8dca3e5c25f358f56c4847