Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe
Resource
win10v2004-20240508-en
General
-
Target
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe
-
Size
60KB
-
MD5
59f7a894987bece515c3f0a52f4251d3
-
SHA1
17e248984a94b6f31b3f27e8a38f30eacb78d24f
-
SHA256
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664
-
SHA512
fd320a382474e92395fa6b5834a2a2db04d119c85ed8f46ac74bbf0a3a8c38cd3e517b38c6ddb7be1cc4c22c6ffa8262c2605643892759ac9f6d5ab2d7ffcfde
-
SSDEEP
1536:ocvhZCVZL22/BtJ1DG2xNMfMZec4feLdlzok:fqVM2/deGLdlzn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xaiguah.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaiguah.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe -
Executes dropped EXE 1 IoCs
Processes:
xaiguah.exepid process 1252 xaiguah.exe -
Adds Run key to start application 2 TTPs 50 IoCs
Processes:
xaiguah.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /V" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /s" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /A" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /h" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /q" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /r" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /T" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /J" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /x" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /P" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /l" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /W" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /z" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /L" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /N" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /H" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /v" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /m" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /g" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /I" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /o" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /Q" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /p" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /D" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /U" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /B" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /j" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /G" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /O" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /K" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /n" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /F" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /d" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /Z" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /i" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /u" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /f" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /R" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /C" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /w" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /S" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /k" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /t" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /a" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /M" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /E" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /Y" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /e" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /c" xaiguah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaiguah = "C:\\Users\\Admin\\xaiguah.exe /b" xaiguah.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xaiguah.exepid process 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe 1252 xaiguah.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exexaiguah.exepid process 5112 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe 1252 xaiguah.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exexaiguah.exedescription pid process target process PID 5112 wrote to memory of 1252 5112 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe xaiguah.exe PID 5112 wrote to memory of 1252 5112 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe xaiguah.exe PID 5112 wrote to memory of 1252 5112 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe xaiguah.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe PID 1252 wrote to memory of 5112 1252 xaiguah.exe 7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe"C:\Users\Admin\AppData\Local\Temp\7701ca24698ee8fb94bd5ef71d9fb09f7e3bf80e080a9abc7aa30912674ae664.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\xaiguah.exe"C:\Users\Admin\xaiguah.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4532,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:81⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b2105299ac2a289146f979bc7ed43971
SHA1d649883133c2781ff928f7419f850c1d2a5279dc
SHA2566b9ef6d370c49ba9263edba56c2ff2ca8ba969f5b673cddd18baea2bc1a65b2f
SHA5121c34b9cb91a7c694d75f30adcb6e5719f14451f1ac71f62e649625764659269ee4cf7fcf38006f34426b95f500b62861011d9af37f11783f1d67955468f6d56b