Analysis
-
max time kernel
163s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/09/2022, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail Audio Transcription.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Voicemail Audio Transcription.js
Resource
win10v2004-20220812-en
General
-
Target
Voicemail Audio Transcription.js
-
Size
10KB
-
MD5
8f321ab4d17b0cfc25f5d0c3564e69ae
-
SHA1
5ad4e803165f3429f8897670dd027fbc0d60012a
-
SHA256
1862c1ff2997083a164df50beaf2655d07e69aa4a281a93d0a3dbbabedfab55d
-
SHA512
461fed457319fbb4743df7e12ec67c3da138b578c6e2a201790e0e47dea17200a6471100d31856380e73d06d6f9865367bf0101795efc7b446efbb3d23b8c710
-
SSDEEP
192:tA+hY4T/OxZ7VWgMLwAQxPKdvEFJwwwwbkAIxVNvsqECEPPPKFTdiG9QPW7HVV+x:PS4rOP7VjKelqzXHI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000005d00e474c639fb3a49bc93ac07b0adc7508c5aade5ca23d949ecc9efb3627087000000000e8000000002000020000000c6da55bc5884fe17df41f3ecd0c193af962107e01f5cb178bf47b97c8e92d8ef200000000171ec2770139c60e083b456b8c268923b0afab1e5cf4bf6109d0f2a68d80b5f4000000059ed25637a21ca059a4ccee10b35f6962256b5d8fcb817a9d9d7e1b84dc125427f437416e8f69e148eaa1528c92792450f6557956e97de58eea561c8e8fca9aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10265d7219cad801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370131297" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9701DAB1-360C-11ED-A993-42FEA5F7B9B2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1580 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1768 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1768 AUDIODG.EXE Token: 33 1768 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1768 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 988 iexplore.exe 988 iexplore.exe 752 IEXPLORE.EXE 752 IEXPLORE.EXE 752 IEXPLORE.EXE 752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1580 wrote to memory of 988 1580 rundll32.exe 33 PID 1580 wrote to memory of 988 1580 rundll32.exe 33 PID 1580 wrote to memory of 988 1580 rundll32.exe 33 PID 988 wrote to memory of 752 988 iexplore.exe 35 PID 988 wrote to memory of 752 988 iexplore.exe 35 PID 988 wrote to memory of 752 988 iexplore.exe 35 PID 988 wrote to memory of 752 988 iexplore.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Voicemail Audio Transcription.js"1⤵PID:1964
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Voicemail Audio Transcription.js1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Voicemail Audio Transcription.js2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514d228ebfccf6f8934d42526461ff0ca
SHA1973e14209d4dbe8dd156030479e6921399b67298
SHA256a78c69daffcbdf83813d0707f2dd0c85038316c8e1f4bc59ff1d0b434fd3318e
SHA51201fe92416509b6245103038d0ddfeefab81db9011403bdc698c807900edd9736de855d60d216adf502c9a542ec70e4c139689a5e2fe2bc6b406c73f92a5b8e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5378ccede5c7f656500685819fdff3acc
SHA1771b0e716acba8df3fe153407f5ccd0506e3d674
SHA2564cc0b9c1fcabb8d52d5036bb067e100232e637c9e904e9fc6db9a1ecac49d0e9
SHA512207608e515220b47c3cde2d934c6fa09999415184ba8b3284c7e78bf77ab310ca66f2e71b83674c1ad31a0d24d61c2976460ff5f8355c64ab3fc0f4b4170ecba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fc6655aa18eb160efeb5c69209c1e9d4
SHA19af57d1efa52060f35fc993b26338cd8ba0e1bf5
SHA2561c420482a2c3e43669ccd9850401c570096052c3dadc2fb0853646f77e2d6065
SHA51208b641e72eab2a3db6415e372c4aed17b9a158c63f7c39f85d9a6609d617f5ab46e663019cd500444acfab36a22239c8e37215b52ac37add9210ee27e8a068bd
-
Filesize
608B
MD57af4264a741e8957babbf503a505e749
SHA1d80282a7a30e2b21849c2a7a623cb5ed97605edb
SHA25697d5a140d35900678262a1c554f8eb5dc4f615f0ac995e6b289b36911672cbb2
SHA51256df4c6b0b732bf4464dd15d3b30dd5b2d0b2bf7ee69a4fabede31447d73784a10f7612d0f301ec4095ebdbbb4aca7ac37e5cf38457718588b8c4ac36de9b85c