Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 10:38

General

  • Target

    dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe

  • Size

    84KB

  • MD5

    325716811f53075a13fac48eee857f84

  • SHA1

    a92abdbceaec24a6139cced1d385caea904ee20a

  • SHA256

    dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7

  • SHA512

    d6d32b306fe7670e9fcb8b254a2180b2c5236af8e9de446c10633f9851a02c5de5135de58c1e626bdd82d3869973087f4a588230de6f72e4651b54c6429df78f

  • SSDEEP

    1536:Dz8yZp47bg4htUVGLG/wXJYeUj27dTo13i6EmqSc:JpWUVeG/wXJY527ujc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe
    "C:\Users\Admin\AppData\Local\Temp\dffaf281dd222bb879938f5d9d350fec7a44ee103f7270af30e41bb1d6b237f7.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\voeji.exe
      "C:\Users\Admin\voeji.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\voeji.exe

    Filesize

    84KB

    MD5

    7057d01e490775b12c82271c40a14af7

    SHA1

    67980ed0642c9cfeb04ea200f8019297eeb73fb3

    SHA256

    73fe169fcd2590c1f3f66c4d3ea30713dc96f7102088717103fafe57b6387aa3

    SHA512

    007cf3812f31bfa6c715c779d8492515a644f24580bfde3f555eeec1ec7fb74f2c7463ad29b5873f16e926c7848937b57c72f5f1d9bd5e7a71b0db86dadb8866

  • C:\Users\Admin\voeji.exe

    Filesize

    84KB

    MD5

    7057d01e490775b12c82271c40a14af7

    SHA1

    67980ed0642c9cfeb04ea200f8019297eeb73fb3

    SHA256

    73fe169fcd2590c1f3f66c4d3ea30713dc96f7102088717103fafe57b6387aa3

    SHA512

    007cf3812f31bfa6c715c779d8492515a644f24580bfde3f555eeec1ec7fb74f2c7463ad29b5873f16e926c7848937b57c72f5f1d9bd5e7a71b0db86dadb8866

  • memory/4440-134-0x0000000000000000-mapping.dmp