Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/11/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
Арр-1.0.9-x64-ReleaseВ.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
README.txt
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Release.zip
Resource
win11-20241007-en
General
-
Target
Арр-1.0.9-x64-ReleaseВ.zip
-
Size
55.1MB
-
MD5
e785d8b3eb3095653da5a33af913c838
-
SHA1
4e52b5da12d92bf1a8b87b00107cc60c1231fb1e
-
SHA256
c8316cdcf1228e049c3bc470d4c881827f912cb3cc5a9012145d2c8160e56428
-
SHA512
d0c2a411138af741e008e85fec2e3b56dd5cd7d6dabdd25f35a6120517a7eb520e6567777c4497d54baff75c3e15e27c8776c162d40b36abed34c571474f8868
-
SSDEEP
1572864:ApiQeJzIiEkrF4jYEJYRanE4Ap645ur38:5JEiTh4ZKqLg04
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XenoB.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings 7zFM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 484 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 7zFM.exe 3468 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3468 7zFM.exe 4792 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3468 7zFM.exe Token: 35 3468 7zFM.exe Token: SeSecurityPrivilege 3468 7zFM.exe Token: SeSecurityPrivilege 3468 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3468 7zFM.exe 3468 7zFM.exe 3468 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4792 OpenWith.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3468 wrote to memory of 484 3468 7zFM.exe 78 PID 3468 wrote to memory of 484 3468 7zFM.exe 78 PID 3972 wrote to memory of 3196 3972 XenoB.exe 92 PID 3972 wrote to memory of 3196 3972 XenoB.exe 92 PID 3972 wrote to memory of 3196 3972 XenoB.exe 92
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Арр-1.0.9-x64-ReleaseВ.zip"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOC8D4CEE7\README.txt2⤵
- Opens file in notepad (likely ransom note)
PID:484
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\Xeno\XenoB.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\Xeno\XenoB.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\Xeno\XenoB.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\Xeno\XenoB.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4792
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵
- System Location Discovery: System Language Discovery
PID:224
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1324
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵
- System Location Discovery: System Language Discovery
PID:768
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3576
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵PID:4684
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵PID:4164
-
C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"C:\Users\Admin\Desktop\Release\Xeno\XenoB.exe"1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5c4a4951af1fa873001f20d417b911300
SHA1716446b4cb405a88d51b3ca5f682ef2b5dea5be7
SHA256f5d5dcf0bf3cfe86d237d5b998112c3ac734dcfbd0ae3cf4b820bc9ce607ca43
SHA512935999bc3ba6c10535fded350f9cd1cd9500f50e4f2707a0f91f7111aefca72fbc3e2de0bcba70763f84ca01c8cf885714175c4100a9f51564a18da2c048f53b