Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
dfaf8bf5dca330440c38b6cce6f868fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfaf8bf5dca330440c38b6cce6f868fb.exe
Resource
win10v2004-20240226-en
General
-
Target
dfaf8bf5dca330440c38b6cce6f868fb.exe
-
Size
144KB
-
MD5
dfaf8bf5dca330440c38b6cce6f868fb
-
SHA1
49746b8453ecda71402b054f229d8453d488fcb3
-
SHA256
089c70b37e17b83ab9a9e4fc37aa17679d6a7eb832595b4264ad54bed1581d89
-
SHA512
b7839ef03befddcbf1ebe449677f180d94d055ae1eba29f6fa25a653a69c3d21090b07115bcf1397e8fcb4319193a5a19ddf86bde55793013d8757e970f371aa
-
SSDEEP
1536:MtljAWunE0ggGDHjDTYpK3XZxkIh1mF+0da1f6ymqneF05bV4oQ/hKeXsjEFbZl:Mtgnhg/zLKM0AGMeF05p4oQZiE5Zl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dfaf8bf5dca330440c38b6cce6f868fb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaelau.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 xaelau.exe -
Loads dropped DLL 2 IoCs
pid Process 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /L" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /K" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /k" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /Q" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /S" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /w" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /j" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /r" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /v" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /H" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /u" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /f" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /c" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /e" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /E" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /I" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /t" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /q" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /N" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /F" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /B" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /y" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /c" dfaf8bf5dca330440c38b6cce6f868fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /a" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /U" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /n" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /g" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /x" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /J" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /V" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /R" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /M" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /C" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /m" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /P" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /p" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /Y" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /X" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /s" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /T" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /D" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /O" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /A" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /W" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /h" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /l" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /G" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /Z" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /i" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /d" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /z" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /b" xaelau.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaelau = "C:\\Users\\Admin\\xaelau.exe /o" xaelau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe 2964 xaelau.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 2964 xaelau.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2964 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 28 PID 2476 wrote to memory of 2964 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 28 PID 2476 wrote to memory of 2964 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 28 PID 2476 wrote to memory of 2964 2476 dfaf8bf5dca330440c38b6cce6f868fb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfaf8bf5dca330440c38b6cce6f868fb.exe"C:\Users\Admin\AppData\Local\Temp\dfaf8bf5dca330440c38b6cce6f868fb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\xaelau.exe"C:\Users\Admin\xaelau.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5b06c14a2b1c4d9915613844fbaa59e8c
SHA17f444d3503c56b70efb6d6659f5cfaad3c4dec96
SHA2561f8155667046c6b06bd0277f2ba775a7f25ee2570ef9ab2e9587a0b5fe2d88ad
SHA5125c88b7ab2e5a183de94dc6fe75dca5993173cd9f76f7aacb2f8cb31f5e76b38cffe8a9b1c1c2e7b40edfb92cc3e28512b2024acdb1cff708bfccee56073af5b0