Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe
Resource
win10v2004-20220812-en
General
-
Target
090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe
-
Size
224KB
-
MD5
72aa20fa4447270503e1058fae2f778e
-
SHA1
6cab9923961d4d009f5a1aa1623a6cd944f20f60
-
SHA256
090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a
-
SHA512
22ff65536a75611fccbc0ae541f7da9e1e4a018a830ddc159524b04cd72cbabe1c1a8b12caab9a579a3b36f1831659b6bbe844261852703fbb18f589f95548c7
-
SSDEEP
3072:NOHQs0tQ9nLHbB9W+k9ZJgImCEHpOIGJ:Nq4QxL7B9W+2JgIPEc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voaca.exe -
Executes dropped EXE 1 IoCs
pid Process 824 voaca.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /o" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /j" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /h" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /z" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /n" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /u" voaca.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /x" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /l" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /k" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /e" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /g" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /i" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /c" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /w" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /q" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /t" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /v" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /m" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /p" 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /a" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /y" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /f" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /s" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /b" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /d" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /r" voaca.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaca = "C:\\Users\\Admin\\voaca.exe /p" voaca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe 824 voaca.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 824 voaca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 824 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 26 PID 1344 wrote to memory of 824 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 26 PID 1344 wrote to memory of 824 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 26 PID 1344 wrote to memory of 824 1344 090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe"C:\Users\Admin\AppData\Local\Temp\090b394a245336a50115ed640ea2083c7852e825446468eb48b98d85b7ff2b8a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\voaca.exe"C:\Users\Admin\voaca.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b0dd294c8d926b3b3f88d7956deb9025
SHA1c392c0491d217013451dec683bca13a230ef3329
SHA2561c8cfffc742d0bd0bee7df7abe29b1a7430da87248805fee04908ce23398decf
SHA5122a00248516d4075da8477fbb5e104d47f7940ade790bb61c7f447024580404d1a3147e4c458c7cc8825295d41919643962a796c2ba112b486419323a11b4e2e5
-
Filesize
224KB
MD5b0dd294c8d926b3b3f88d7956deb9025
SHA1c392c0491d217013451dec683bca13a230ef3329
SHA2561c8cfffc742d0bd0bee7df7abe29b1a7430da87248805fee04908ce23398decf
SHA5122a00248516d4075da8477fbb5e104d47f7940ade790bb61c7f447024580404d1a3147e4c458c7cc8825295d41919643962a796c2ba112b486419323a11b4e2e5
-
Filesize
224KB
MD5b0dd294c8d926b3b3f88d7956deb9025
SHA1c392c0491d217013451dec683bca13a230ef3329
SHA2561c8cfffc742d0bd0bee7df7abe29b1a7430da87248805fee04908ce23398decf
SHA5122a00248516d4075da8477fbb5e104d47f7940ade790bb61c7f447024580404d1a3147e4c458c7cc8825295d41919643962a796c2ba112b486419323a11b4e2e5
-
Filesize
224KB
MD5b0dd294c8d926b3b3f88d7956deb9025
SHA1c392c0491d217013451dec683bca13a230ef3329
SHA2561c8cfffc742d0bd0bee7df7abe29b1a7430da87248805fee04908ce23398decf
SHA5122a00248516d4075da8477fbb5e104d47f7940ade790bb61c7f447024580404d1a3147e4c458c7cc8825295d41919643962a796c2ba112b486419323a11b4e2e5