Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:45
Static task
static1
Behavioral task
behavioral1
Sample
038679fdd242e6886d6a6bc631f31991.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
038679fdd242e6886d6a6bc631f31991.exe
Resource
win10v2004-20231215-en
General
-
Target
038679fdd242e6886d6a6bc631f31991.exe
-
Size
248KB
-
MD5
038679fdd242e6886d6a6bc631f31991
-
SHA1
8569e82220960fca46817f99992b3f647c313381
-
SHA256
7b583b5ae85ac25cb9d6f05587b26904e4389b2f8f5b4710c46acc86b5235ea4
-
SHA512
c158ace187f0ffedd9659462f1a03319ac95fc5ec014e7703bd09d61bded23c794ee5ca67f716f6a27e5fd2d481cc81a55fcd1b26cc8813d05f9034cdbe732b0
-
SSDEEP
3072:EAYTc3bNEnv9DHkY+38wG/wUnois8Y2ngX+e/M7oM0HYLcjoYBsH2d:EHTayI8wGfoUY2gXo7oX4LcdBs2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoobak.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 038679fdd242e6886d6a6bc631f31991.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 xoobak.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /w" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /P" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /G" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /D" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /x" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /O" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /U" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /A" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /C" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /r" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /J" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /s" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /e" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /f" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /j" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /c" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /Z" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /L" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /Y" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /p" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /o" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /v" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /t" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /N" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /T" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /u" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /m" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /a" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /E" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /V" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /S" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /q" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /i" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /I" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /d" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /R" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /h" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /F" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /M" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /Q" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /H" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /K" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /B" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /n" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /z" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /k" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /y" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /X" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /W" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /g" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /l" xoobak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoobak = "C:\\Users\\Admin\\xoobak.exe /b" xoobak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe 4528 xoobak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 038679fdd242e6886d6a6bc631f31991.exe 4528 xoobak.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4528 2176 038679fdd242e6886d6a6bc631f31991.exe 91 PID 2176 wrote to memory of 4528 2176 038679fdd242e6886d6a6bc631f31991.exe 91 PID 2176 wrote to memory of 4528 2176 038679fdd242e6886d6a6bc631f31991.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\038679fdd242e6886d6a6bc631f31991.exe"C:\Users\Admin\AppData\Local\Temp\038679fdd242e6886d6a6bc631f31991.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\xoobak.exe"C:\Users\Admin\xoobak.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5cd4848df6e815e52b878761d9f7a497c
SHA1dd128199d4028cbe410d1678805c8ba77b0f431a
SHA25675360d88f6c6cc1d4ccf7baaaaf92c1382db3a44eca4e6d93492fe20dd762901
SHA512aae941189b9380361875d318fcf20b4278136db9e4ce55c9f108e4d9a01badb6aae84b2e5660bd0ada77cc1ed9fe950fc997319306a4e7354e1a9641746db3f7