Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe
Resource
win10v2004-20220812-en
General
-
Target
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe
-
Size
138KB
-
MD5
b2e04c471211884fc800c91ab506abfd
-
SHA1
3d210a8dcc5a2446ad7c991df47c07189af19998
-
SHA256
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf
-
SHA512
5952a5a266f3f523eac4722c2c4e79abbf8a37c192d93474bbb1dc5f1d5432773c77888fabb4207b7dab61ba0c5e4670b6f7c5edd390ea878e29f4462982e474
-
SSDEEP
3072:KT+x50VJqtHGbu5XCniylWrtGA1GHvGXaCH1Fukp1dZ3wQGN:KT+oGtmiYlW4A1QvGXjBduQGN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vouda.exepid process 1600 vouda.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1956 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exepid process 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vouda.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run vouda.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CC743FD4-BD60-A740-C6D9-995A659D1391} = "C:\\Users\\Admin\\AppData\\Roaming\\Goemit\\vouda.exe" vouda.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exedescription pid process target process PID 864 set thread context of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe -
Processes:
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\580D5B5C-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
vouda.exepid process 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe 1600 vouda.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.execmd.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe Token: SeSecurityPrivilege 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe Token: SeSecurityPrivilege 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe Token: SeSecurityPrivilege 1956 cmd.exe Token: SeManageVolumePrivilege 664 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 664 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 664 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 664 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exevouda.exedescription pid process target process PID 864 wrote to memory of 1600 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe vouda.exe PID 864 wrote to memory of 1600 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe vouda.exe PID 864 wrote to memory of 1600 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe vouda.exe PID 864 wrote to memory of 1600 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe vouda.exe PID 1600 wrote to memory of 1216 1600 vouda.exe taskhost.exe PID 1600 wrote to memory of 1216 1600 vouda.exe taskhost.exe PID 1600 wrote to memory of 1216 1600 vouda.exe taskhost.exe PID 1600 wrote to memory of 1216 1600 vouda.exe taskhost.exe PID 1600 wrote to memory of 1216 1600 vouda.exe taskhost.exe PID 1600 wrote to memory of 1296 1600 vouda.exe Dwm.exe PID 1600 wrote to memory of 1296 1600 vouda.exe Dwm.exe PID 1600 wrote to memory of 1296 1600 vouda.exe Dwm.exe PID 1600 wrote to memory of 1296 1600 vouda.exe Dwm.exe PID 1600 wrote to memory of 1296 1600 vouda.exe Dwm.exe PID 1600 wrote to memory of 1376 1600 vouda.exe Explorer.EXE PID 1600 wrote to memory of 1376 1600 vouda.exe Explorer.EXE PID 1600 wrote to memory of 1376 1600 vouda.exe Explorer.EXE PID 1600 wrote to memory of 1376 1600 vouda.exe Explorer.EXE PID 1600 wrote to memory of 1376 1600 vouda.exe Explorer.EXE PID 1600 wrote to memory of 864 1600 vouda.exe 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe PID 1600 wrote to memory of 864 1600 vouda.exe 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe PID 1600 wrote to memory of 864 1600 vouda.exe 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe PID 1600 wrote to memory of 864 1600 vouda.exe 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe PID 1600 wrote to memory of 864 1600 vouda.exe 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 864 wrote to memory of 1956 864 8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe cmd.exe PID 1600 wrote to memory of 364 1600 vouda.exe conhost.exe PID 1600 wrote to memory of 364 1600 vouda.exe conhost.exe PID 1600 wrote to memory of 364 1600 vouda.exe conhost.exe PID 1600 wrote to memory of 364 1600 vouda.exe conhost.exe PID 1600 wrote to memory of 364 1600 vouda.exe conhost.exe PID 1600 wrote to memory of 664 1600 vouda.exe WinMail.exe PID 1600 wrote to memory of 664 1600 vouda.exe WinMail.exe PID 1600 wrote to memory of 664 1600 vouda.exe WinMail.exe PID 1600 wrote to memory of 664 1600 vouda.exe WinMail.exe PID 1600 wrote to memory of 664 1600 vouda.exe WinMail.exe PID 1600 wrote to memory of 680 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 680 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 680 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 680 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 680 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 1396 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 1396 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 1396 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 1396 1600 vouda.exe DllHost.exe PID 1600 wrote to memory of 1396 1600 vouda.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe"C:\Users\Admin\AppData\Local\Temp\8423a04ca4fc3f10134ca4082ce292fba423b714071013147c12f93a4d379ecf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Roaming\Goemit\vouda.exe"C:\Users\Admin\AppData\Roaming\Goemit\vouda.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp687f4800.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1296
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1501962695182194761788215754314713125137567788301581250091257845821-1936345366"1⤵PID:364
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:680
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52a15b786a1250400007ca60faadd3858
SHA1e54c548fde6f322fe449bb123cd8b224fe094c25
SHA2560a3b20a9f3bd4074ab54e6be58015734795241ed618baa6826f3e74326a4aef5
SHA512f4db2f7d012c4a86459dc32e958ae41a43155b5a599b0d325f12b19bc2e203c249b1cdf6c810a22519eaae95613f03cfb4b6fd9160d3f5cccbcbed4524f878b6
-
Filesize
138KB
MD522c4f3a20c28cb248d23cb10acfeb9b1
SHA18fad185137b43aaabcc7c6a5561ddb9a970498d0
SHA256913f928aa72f6c4a409f9ad43790c88503953d62d939813e539a5da515ac1b3b
SHA51224b2803ddd531aa5a99d121ae2ff947a77c80dd666fb57b5b364b82ae2d105c58f78cbadc3abd3f6dbf9f550f30ca2a3033be0e287c622ea359ad4246c21db3b
-
Filesize
138KB
MD522c4f3a20c28cb248d23cb10acfeb9b1
SHA18fad185137b43aaabcc7c6a5561ddb9a970498d0
SHA256913f928aa72f6c4a409f9ad43790c88503953d62d939813e539a5da515ac1b3b
SHA51224b2803ddd531aa5a99d121ae2ff947a77c80dd666fb57b5b364b82ae2d105c58f78cbadc3abd3f6dbf9f550f30ca2a3033be0e287c622ea359ad4246c21db3b
-
Filesize
398B
MD5faf0e62fd8f170560a7eeed7fca16bc8
SHA1c446c089eb99ce43d27a3602de227c8286e4a631
SHA256c2458323f93df838e37bc63e3a060d8a9ab4887c0385f12c8949df26ec218b95
SHA512277a6eef2602e752963c96ca6af5d28776ee6114757821c2bd9f19f1b829fb05c30009478f98f1484ac2576aed8ad3011e4924b8401a1a258353b3dbf2ad5df8
-
Filesize
138KB
MD522c4f3a20c28cb248d23cb10acfeb9b1
SHA18fad185137b43aaabcc7c6a5561ddb9a970498d0
SHA256913f928aa72f6c4a409f9ad43790c88503953d62d939813e539a5da515ac1b3b
SHA51224b2803ddd531aa5a99d121ae2ff947a77c80dd666fb57b5b364b82ae2d105c58f78cbadc3abd3f6dbf9f550f30ca2a3033be0e287c622ea359ad4246c21db3b
-
Filesize
138KB
MD522c4f3a20c28cb248d23cb10acfeb9b1
SHA18fad185137b43aaabcc7c6a5561ddb9a970498d0
SHA256913f928aa72f6c4a409f9ad43790c88503953d62d939813e539a5da515ac1b3b
SHA51224b2803ddd531aa5a99d121ae2ff947a77c80dd666fb57b5b364b82ae2d105c58f78cbadc3abd3f6dbf9f550f30ca2a3033be0e287c622ea359ad4246c21db3b