Analysis

  • max time kernel
    165s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 15:41

General

  • Target

    31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe

  • Size

    132KB

  • MD5

    362d3942e3c12bc178fd688f8fb5fac0

  • SHA1

    3ab1c635b33417d2a766d3c7f02c2f292ff1c0cc

  • SHA256

    31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400

  • SHA512

    da4fe74d765f146b898a04e2db831196c69dddb0f5e131599057255d5ff5278422abd6366dc2e81926e91448ae516166f30bec037bf76352028ece86fd062161

  • SSDEEP

    3072:smBwihLH2uI32L6z4YjXtNNnuCpaAL/5kCifrXBQsiIM:1xlH293O6zFjXtHrpaAL/5kCifrXBQsS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe
    "C:\Users\Admin\AppData\Local\Temp\31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\vooaru.exe
      "C:\Users\Admin\vooaru.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4220

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\vooaru.exe

          Filesize

          132KB

          MD5

          adb65a16254e8aed20ad5661d5670ffd

          SHA1

          fd173ca6fe9a0d682ce55e951b62ac3e58a62d88

          SHA256

          b4e4a646deab05fa4160f825c8e49b8b1ef554484718f2af7e77bc7dec3a7cc8

          SHA512

          0ab6e172d648caaf94290943dca02660828e966236f8494f031c438e90531a5cb056e79b45d7a587496ce7d93d9164b6ab91d6de970861208844e179d0872b29

        • C:\Users\Admin\vooaru.exe

          Filesize

          132KB

          MD5

          adb65a16254e8aed20ad5661d5670ffd

          SHA1

          fd173ca6fe9a0d682ce55e951b62ac3e58a62d88

          SHA256

          b4e4a646deab05fa4160f825c8e49b8b1ef554484718f2af7e77bc7dec3a7cc8

          SHA512

          0ab6e172d648caaf94290943dca02660828e966236f8494f031c438e90531a5cb056e79b45d7a587496ce7d93d9164b6ab91d6de970861208844e179d0872b29