Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 16:56
Static task
static1
Behavioral task
behavioral1
Sample
daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe
Resource
win10v2004-20221111-en
General
-
Target
daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe
-
Size
108KB
-
MD5
451001cd40034d87d481e49890e93539
-
SHA1
c55f2a3dea850db9eb49eaa5d204c5c196660f1b
-
SHA256
daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3
-
SHA512
0263e354a44ba067725acbfc790a93a99359c3cbc3196a63ccf2fb3c0cee5f536ee5e9e2b25613259763d02930824f27d9386d734d87a89578c78d76f07efcec
-
SSDEEP
1536:3ZaHwn4P58jR3QByPQp0wB+XmK5iguHggRTHHgcxIeUN4yEn7Ny+e2qi/7:m5MAGuHggRTHHgpVU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voeqiap.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 voeqiap.exe -
Loads dropped DLL 2 IoCs
pid Process 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /t" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /z" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /q" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /y" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /s" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /g" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /t" daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /e" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /x" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /a" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /p" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /f" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /v" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /o" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /w" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /m" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /i" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /k" voeqiap.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /r" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /b" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /d" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /l" voeqiap.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /h" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /c" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /j" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /u" voeqiap.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\voeqiap = "C:\\Users\\Admin\\voeqiap.exe /n" voeqiap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe 1652 voeqiap.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 1652 voeqiap.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1652 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 27 PID 1256 wrote to memory of 1652 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 27 PID 1256 wrote to memory of 1652 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 27 PID 1256 wrote to memory of 1652 1256 daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe"C:\Users\Admin\AppData\Local\Temp\daea6eb822d354f6dd51f0e2caa8fb017e3dbb2f264c9d696f82d75dfce1c9e3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\voeqiap.exe"C:\Users\Admin\voeqiap.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5f84b6077ebc613eadd5f04ba84b66e31
SHA1e8e8163218b562772f0701b6d75bc8cbb0041af2
SHA256454d6a42b7aeea813847f264518a8d6e67db857f43e759f91e4de0499f79ce47
SHA51290892c3334e331114a49b41438c686686569d35bd89210e97cfb3d0a2009f748107fe076a3b8c4bd15985cdb3dda5d8a35df0aa53b0962737053e0e4ad7369c1
-
Filesize
108KB
MD5f84b6077ebc613eadd5f04ba84b66e31
SHA1e8e8163218b562772f0701b6d75bc8cbb0041af2
SHA256454d6a42b7aeea813847f264518a8d6e67db857f43e759f91e4de0499f79ce47
SHA51290892c3334e331114a49b41438c686686569d35bd89210e97cfb3d0a2009f748107fe076a3b8c4bd15985cdb3dda5d8a35df0aa53b0962737053e0e4ad7369c1
-
Filesize
108KB
MD5f84b6077ebc613eadd5f04ba84b66e31
SHA1e8e8163218b562772f0701b6d75bc8cbb0041af2
SHA256454d6a42b7aeea813847f264518a8d6e67db857f43e759f91e4de0499f79ce47
SHA51290892c3334e331114a49b41438c686686569d35bd89210e97cfb3d0a2009f748107fe076a3b8c4bd15985cdb3dda5d8a35df0aa53b0962737053e0e4ad7369c1
-
Filesize
108KB
MD5f84b6077ebc613eadd5f04ba84b66e31
SHA1e8e8163218b562772f0701b6d75bc8cbb0041af2
SHA256454d6a42b7aeea813847f264518a8d6e67db857f43e759f91e4de0499f79ce47
SHA51290892c3334e331114a49b41438c686686569d35bd89210e97cfb3d0a2009f748107fe076a3b8c4bd15985cdb3dda5d8a35df0aa53b0962737053e0e4ad7369c1