Analysis
-
max time kernel
165s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe
Resource
win10v2004-20220812-en
General
-
Target
31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe
-
Size
132KB
-
MD5
362d3942e3c12bc178fd688f8fb5fac0
-
SHA1
3ab1c635b33417d2a766d3c7f02c2f292ff1c0cc
-
SHA256
31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400
-
SHA512
da4fe74d765f146b898a04e2db831196c69dddb0f5e131599057255d5ff5278422abd6366dc2e81926e91448ae516166f30bec037bf76352028ece86fd062161
-
SSDEEP
3072:smBwihLH2uI32L6z4YjXtNNnuCpaAL/5kCifrXBQsiIM:1xlH293O6zFjXtHrpaAL/5kCifrXBQsS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vooaru.exe -
Executes dropped EXE 1 IoCs
pid Process 4220 vooaru.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /z" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /F" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /x" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /R" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /A" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /p" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /V" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /G" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /i" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /a" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /U" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /C" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /m" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /L" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /Y" vooaru.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /v" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /g" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /b" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /O" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /q" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /D" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /u" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /w" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /H" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /c" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /T" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /S" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /k" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /r" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /s" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /f" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /h" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /W" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /n" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /l" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /P" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /t" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /I" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /E" vooaru.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /Q" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /d" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /J" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /g" 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /e" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /y" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /M" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /K" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /j" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /o" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /X" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /N" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /B" vooaru.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vooaru = "C:\\Users\\Admin\\vooaru.exe /Z" vooaru.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe 4220 vooaru.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 4220 vooaru.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4220 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 83 PID 5052 wrote to memory of 4220 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 83 PID 5052 wrote to memory of 4220 5052 31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe"C:\Users\Admin\AppData\Local\Temp\31cd17aead67b878e08ded6c84156ef16460fb16c2ba533fd74bf81b218e7400.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\vooaru.exe"C:\Users\Admin\vooaru.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5adb65a16254e8aed20ad5661d5670ffd
SHA1fd173ca6fe9a0d682ce55e951b62ac3e58a62d88
SHA256b4e4a646deab05fa4160f825c8e49b8b1ef554484718f2af7e77bc7dec3a7cc8
SHA5120ab6e172d648caaf94290943dca02660828e966236f8494f031c438e90531a5cb056e79b45d7a587496ce7d93d9164b6ab91d6de970861208844e179d0872b29
-
Filesize
132KB
MD5adb65a16254e8aed20ad5661d5670ffd
SHA1fd173ca6fe9a0d682ce55e951b62ac3e58a62d88
SHA256b4e4a646deab05fa4160f825c8e49b8b1ef554484718f2af7e77bc7dec3a7cc8
SHA5120ab6e172d648caaf94290943dca02660828e966236f8494f031c438e90531a5cb056e79b45d7a587496ce7d93d9164b6ab91d6de970861208844e179d0872b29