Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe
Resource
win10v2004-20220812-en
General
-
Target
490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe
-
Size
100KB
-
MD5
93623ecf6f00f1a89ad31f3b30349f8e
-
SHA1
76ac8d6d19ff4c3307b4add72f68588a59745b00
-
SHA256
490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b
-
SHA512
538c74c61006f5806e51fbde1f0d28920325e005a8a5100b2b8354cfd2d2d7929321e2c4bb2ecfd8cc1df42962583a68bbe7107b5fb1c73e3ff28a477fe8817a
-
SSDEEP
1536:qyWYcX220mQNKHxJKIRGWcOUP7vXArnY1ZqAefzyeshNIjnZu:TsQHNAfzyemCnw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voaiqaf.exe -
Executes dropped EXE 1 IoCs
pid Process 1376 voaiqaf.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /Y" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /q" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /X" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /w" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /t" voaiqaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /T" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /W" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /h" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /g" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /G" 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /F" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /I" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /y" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /O" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /J" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /A" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /k" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /f" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /o" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /Q" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /b" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /n" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /E" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /m" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /G" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /H" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /U" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /a" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /L" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /K" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /R" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /D" voaiqaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /P" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /B" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /p" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /S" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /v" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /r" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /c" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /M" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /j" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /x" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /s" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /V" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /l" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /Z" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /N" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /u" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /e" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /d" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /i" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /C" voaiqaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\voaiqaf = "C:\\Users\\Admin\\voaiqaf.exe /z" voaiqaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe 1376 voaiqaf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 1376 voaiqaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1376 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 28 PID 2004 wrote to memory of 1376 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 28 PID 2004 wrote to memory of 1376 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 28 PID 2004 wrote to memory of 1376 2004 490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe"C:\Users\Admin\AppData\Local\Temp\490590f2c6cb15458ce4a8c98f332e9076b5d420a2d4967906abc60236ebe92b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\voaiqaf.exe"C:\Users\Admin\voaiqaf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b6ca36c0ffeea3cad393ce98b279dde8
SHA19cb7937bccef572ac6c15a4184bf78b851546899
SHA2563dc7124420e7d75e31fc8dadf860a3a1519629ab82c304773d954d7905443060
SHA512b0486497b3a96a831466be9dd120b19348dd627eba520e4ed08a9da343ab1e9915d28253eb8d7eb4a74a805f61019c812bb96b9da04042225aeff7635d459b1d
-
Filesize
100KB
MD5b6ca36c0ffeea3cad393ce98b279dde8
SHA19cb7937bccef572ac6c15a4184bf78b851546899
SHA2563dc7124420e7d75e31fc8dadf860a3a1519629ab82c304773d954d7905443060
SHA512b0486497b3a96a831466be9dd120b19348dd627eba520e4ed08a9da343ab1e9915d28253eb8d7eb4a74a805f61019c812bb96b9da04042225aeff7635d459b1d
-
Filesize
100KB
MD5b6ca36c0ffeea3cad393ce98b279dde8
SHA19cb7937bccef572ac6c15a4184bf78b851546899
SHA2563dc7124420e7d75e31fc8dadf860a3a1519629ab82c304773d954d7905443060
SHA512b0486497b3a96a831466be9dd120b19348dd627eba520e4ed08a9da343ab1e9915d28253eb8d7eb4a74a805f61019c812bb96b9da04042225aeff7635d459b1d
-
Filesize
100KB
MD5b6ca36c0ffeea3cad393ce98b279dde8
SHA19cb7937bccef572ac6c15a4184bf78b851546899
SHA2563dc7124420e7d75e31fc8dadf860a3a1519629ab82c304773d954d7905443060
SHA512b0486497b3a96a831466be9dd120b19348dd627eba520e4ed08a9da343ab1e9915d28253eb8d7eb4a74a805f61019c812bb96b9da04042225aeff7635d459b1d