Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 19:33

General

  • Target

    _private/start.exe

  • Size

    1.5MB

  • MD5

    7570470b1ceccc6c936c482420704fd4

  • SHA1

    30bc1a4a60b1c32846226c1adf68df4564789b6d

  • SHA256

    4ec7f96812c6b994cbb719d16870313b4cd44cb96ad01367dd0293ecb7c128b8

  • SHA512

    f1a6b4cc19276c3144f64c73072bab6fd73d95937bffbe690d692bbadc71df633c76d0e07074916cea6eb17793a5796e356c3df5c0d0f3e3f585ee849049354a

  • SSDEEP

    24576:/5dZufOrzvckB+Fr+waFHTcqunNW3QdWvPiVD2CWgrUE94FFs+n9rQOF8nX7:/5dVwPaFHTTgkAAn2IQ39y9rRF8L

Malware Config

Signatures

  • Detected Xorist Ransomware 3 IoCs
  • Xorist Ransomware

    Xorist is a ransomware first seen in 2020.

  • Xorist family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_private\start.exe
    "C:\Users\Admin\AppData\Local\Temp\_private\start.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\_private\start.exe
      "C:\Users\Admin\AppData\Local\Temp\_private\start.exe"
      2⤵
      • Checks BIOS information in registry
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Users\Admin\AppData\Local\Temp\_private\start.exe
        C:\Users\Admin\AppData\Local\Temp\_private\start.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
          4⤵
          • Executes dropped EXE
          PID:2216
        • C:\Users\Admin\AppData\Local\Temp\svhosts.exe
          "C:\Users\Admin\AppData\Local\Temp\svhosts.exe"
          4⤵
          • Executes dropped EXE
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\svhost.exe

    Filesize

    15KB

    MD5

    c69e45d794c736cc7010b8f2a2bf5552

    SHA1

    50572e2752d8968585c7832fac11ea067c7bf3df

    SHA256

    6a0cd2030eb9daf05021ea4d007da474cdb196c4c4efa9094173377e7ce5d36d

    SHA512

    f9b0a3446716d3be050995d041f1cac9c89ff746b7ac7eb6bd43ba4117ba083b4a29190df0d25b720977901b8506c69ee21e9291db0f33c38904f29f93c1e2a3

  • C:\Users\Admin\AppData\Local\Temp\svhosts.exe

    Filesize

    11KB

    MD5

    d94bfb49259b0dc224580099d88899e5

    SHA1

    33d595f97c39684562e9c3342d1477719e91678d

    SHA256

    cee0058819af4ced052cc25032682e1739574080196e4727b8b390591d634003

    SHA512

    a1be423b0a76696688ff0999b840e9bd80397506e0a921383c61f84e2dda9a2fc93d7745d7d9f304e7c440553dac4002141d47f27d7308746ca1948fcbc9c71f

  • memory/1808-35-0x0000000001E90000-0x0000000001FEA000-memory.dmp

    Filesize

    1.4MB

  • memory/1808-10-0x0000000010086000-0x0000000010087000-memory.dmp

    Filesize

    4KB

  • memory/1808-34-0x0000000003300000-0x00000000034AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-2-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-3-0x0000000001E90000-0x0000000001FEA000-memory.dmp

    Filesize

    1.4MB

  • memory/1808-16-0x0000000001E90000-0x0000000001FEA000-memory.dmp

    Filesize

    1.4MB

  • memory/1808-15-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-14-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-13-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-11-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-40-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/1808-9-0x0000000001E90000-0x0000000001FEA000-memory.dmp

    Filesize

    1.4MB

  • memory/2216-58-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2296-25-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-36-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-32-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-31-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-60-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-27-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2296-22-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-33-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2296-20-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2548-1-0x0000000001CF0000-0x0000000001E9C000-memory.dmp

    Filesize

    1.7MB

  • memory/2548-38-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB

  • memory/2548-0-0x0000000010000000-0x00000000101AC000-memory.dmp

    Filesize

    1.7MB