Analysis
-
max time kernel
106s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe
Resource
win10-20230220-en
General
-
Target
Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe
-
Size
98KB
-
MD5
2a08f537ca29735e25fc479034f46e43
-
SHA1
003fbfa6c1b854ee5832bb11546a1996dfe863ac
-
SHA256
c9b0c9b6a4df508c7355509807c67fcf144a2065c21679c6c484f47e91e2d16f
-
SHA512
0a0d9a7bf0971c5d504b80c979b6d4d385104d909e1dc5c90fdf895f545c22b615e26d440958645dd6b2b318acb7048a57a6221f35734b981de495c02c003a49
-
SSDEEP
3072:xkBGWOsTIJgIDU5A/czY6tMDD9ZGY7fxOS:x1ssjuttMD6W
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4196 VoiceAI-Installer.exe -
Loads dropped DLL 2 IoCs
pid Process 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Voice.ai\meta Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe File created C:\Program Files\Voice.ai\VoiceAI-Installer.exe Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0002000000015258-127.dat nsis_installer_1 behavioral1/files/0x0002000000015258-127.dat nsis_installer_2 behavioral1/files/0x0002000000015258-128.dat nsis_installer_1 behavioral1/files/0x0002000000015258-128.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4196 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 66 PID 3992 wrote to memory of 4196 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 66 PID 3992 wrote to memory of 4196 3992 Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe"C:\Users\Admin\AppData\Local\Temp\Voice.ai-Downloader-alphaver-98d52a97240f4fdd93e62097181a9518.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Voice.ai\VoiceAI-Installer.exe"C:\Program Files\Voice.ai\VoiceAI-Installer.exe" /path "C:\Program Files\Voice.ai"2⤵
- Executes dropped EXE
PID:4196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345.6MB
MD54384b5f20d48d69ded251bd6816db210
SHA1852e0977402630dbb2a89221cc77c65e7a02e791
SHA2563e8d81fb9b4f5724ec3c3e3823615f098fae42030bba1bbb05540b75c997efa4
SHA5122da2f7a3523e4b1fbe3a3d2f31625318bfc3b085fc475e764fc5a8d1a6d816797ce7a238088ddd94f160169fbdec7ab0ac0e6b615cac6934907d41b3444e89fb
-
Filesize
338.1MB
MD5f22b7966354c2ecb065d8836df4bb778
SHA12add63ccf3199b2f061a673efc9abfd5bb475cb0
SHA256a4795271409b683d9513c0e3beecf392d689d54a86591dd21d30f39b26fe47d5
SHA512eeb248eb55941e7994e1ee88d0b1e9b0b112b8ead1a7aa3b507d37f08dd617659ceee6f172f23b3cd31259eb5f6ee88b6bb55652589b313d5c0a90b9cb1957a1
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
14KB
MD56ab807f51b07da5d1ad43e82ad1fee42
SHA1886bbf732e5f872642541e8adabfca1b6b264d74
SHA256074996a2d3d99cb5b10d4c4f1ff92bacd45605c8103cb465091d78bc894f73f9
SHA5128ccedbc10394e0dd9763c7c25ea025b6fedeb0bd3d3a83c2e8dc45c8a2d30e3f0366513961a98ffc3ee872f31b009a7e179806f41c65528992299816295588b5