Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 05:04
Behavioral task
behavioral1
Sample
9ad22b128ad5b37a4fb392fab44b9487.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ad22b128ad5b37a4fb392fab44b9487.exe
Resource
win10v2004-20231215-en
General
-
Target
9ad22b128ad5b37a4fb392fab44b9487.exe
-
Size
230KB
-
MD5
9ad22b128ad5b37a4fb392fab44b9487
-
SHA1
1cdef4c3556f3c2af65777f1c962153315eb4083
-
SHA256
2fcc86a28dcd1de07aefff4212e0d6024a72076afa042f3606d4ecdc010ad88d
-
SHA512
c40163289486144abddac917030a029d337911be9d05723a113176f8468973edb43811f5db4c394a3e057beec6577edfe84ac2519c0aa505a2203c801a575c6f
-
SSDEEP
6144:P7qqgZi/MGm0gXxZW2J0knJMMqVfxcQcTAwHNKwNSwbBOmxdoSV:PRg4NmNMZknZqVfWPlHNKwNVEmxdoSV
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
vohi.exepid process 2700 vohi.exe -
Loads dropped DLL 2 IoCs
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exepid process 2504 9ad22b128ad5b37a4fb392fab44b9487.exe 2504 9ad22b128ad5b37a4fb392fab44b9487.exe -
Processes:
resource yara_rule behavioral1/memory/2504-0-0x0000000000400000-0x0000000000464000-memory.dmp upx \Users\Admin\AppData\Roaming\Okaqlu\vohi.exe upx behavioral1/memory/2504-13-0x0000000000470000-0x00000000004D4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
vohi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\{DA6CC81F-ACDB-37B7-3780-4801EAC2A88A} = "C:\\Users\\Admin\\AppData\\Roaming\\Okaqlu\\vohi.exe" vohi.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exevohi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 9ad22b128ad5b37a4fb392fab44b9487.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9ad22b128ad5b37a4fb392fab44b9487.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum vohi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vohi.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exedescription pid process target process PID 2504 set thread context of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe -
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy 9ad22b128ad5b37a4fb392fab44b9487.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 9ad22b128ad5b37a4fb392fab44b9487.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\745C6FCD-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
vohi.exepid process 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe 2700 vohi.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 2504 9ad22b128ad5b37a4fb392fab44b9487.exe Token: SeSecurityPrivilege 2504 9ad22b128ad5b37a4fb392fab44b9487.exe Token: SeSecurityPrivilege 2504 9ad22b128ad5b37a4fb392fab44b9487.exe Token: SeManageVolumePrivilege 2440 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 2440 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 2440 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 2440 WinMail.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
9ad22b128ad5b37a4fb392fab44b9487.exevohi.exedescription pid process target process PID 2504 wrote to memory of 2700 2504 9ad22b128ad5b37a4fb392fab44b9487.exe vohi.exe PID 2504 wrote to memory of 2700 2504 9ad22b128ad5b37a4fb392fab44b9487.exe vohi.exe PID 2504 wrote to memory of 2700 2504 9ad22b128ad5b37a4fb392fab44b9487.exe vohi.exe PID 2504 wrote to memory of 2700 2504 9ad22b128ad5b37a4fb392fab44b9487.exe vohi.exe PID 2700 wrote to memory of 1168 2700 vohi.exe taskhost.exe PID 2700 wrote to memory of 1168 2700 vohi.exe taskhost.exe PID 2700 wrote to memory of 1168 2700 vohi.exe taskhost.exe PID 2700 wrote to memory of 1168 2700 vohi.exe taskhost.exe PID 2700 wrote to memory of 1168 2700 vohi.exe taskhost.exe PID 2700 wrote to memory of 1212 2700 vohi.exe Dwm.exe PID 2700 wrote to memory of 1212 2700 vohi.exe Dwm.exe PID 2700 wrote to memory of 1212 2700 vohi.exe Dwm.exe PID 2700 wrote to memory of 1212 2700 vohi.exe Dwm.exe PID 2700 wrote to memory of 1212 2700 vohi.exe Dwm.exe PID 2700 wrote to memory of 1272 2700 vohi.exe Explorer.EXE PID 2700 wrote to memory of 1272 2700 vohi.exe Explorer.EXE PID 2700 wrote to memory of 1272 2700 vohi.exe Explorer.EXE PID 2700 wrote to memory of 1272 2700 vohi.exe Explorer.EXE PID 2700 wrote to memory of 1272 2700 vohi.exe Explorer.EXE PID 2700 wrote to memory of 2196 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2196 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2196 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2196 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2196 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2504 2700 vohi.exe 9ad22b128ad5b37a4fb392fab44b9487.exe PID 2700 wrote to memory of 2504 2700 vohi.exe 9ad22b128ad5b37a4fb392fab44b9487.exe PID 2700 wrote to memory of 2504 2700 vohi.exe 9ad22b128ad5b37a4fb392fab44b9487.exe PID 2700 wrote to memory of 2504 2700 vohi.exe 9ad22b128ad5b37a4fb392fab44b9487.exe PID 2700 wrote to memory of 2504 2700 vohi.exe 9ad22b128ad5b37a4fb392fab44b9487.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2504 wrote to memory of 1496 2504 9ad22b128ad5b37a4fb392fab44b9487.exe cmd.exe PID 2700 wrote to memory of 1080 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 1080 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 1080 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 1080 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 1080 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2564 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2564 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2564 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2564 2700 vohi.exe DllHost.exe PID 2700 wrote to memory of 2564 2700 vohi.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1168
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1212
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2196
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\9ad22b128ad5b37a4fb392fab44b9487.exe"C:\Users\Admin\AppData\Local\Temp\9ad22b128ad5b37a4fb392fab44b9487.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\Okaqlu\vohi.exe"C:\Users\Admin\AppData\Roaming\Okaqlu\vohi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp53a2508d.bat"3⤵
- Deletes itself
PID:1496
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2440
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a1b6c3695845f0291580c6159a8a99a1
SHA138d2707016573e4a016712a386c9d1984f955834
SHA256bce50ad0b1db394d9dea821b2bec48a9d04f1cd42e82befb018a8cfd10863ba1
SHA5128ca44c196358008fbf6b3fa532b168b6312fae6bebcb72f7b1143272849fb036890e9c1e5c51eebcbd89224944ea423f619f6231e6c26912250b4789a846ce3e
-
Filesize
243B
MD57ce67538ffc55409ee88e0e3ade7352e
SHA151d609ad2e7d032aa07f87cc4917772e221d78a4
SHA2560470f885ee309a998da2ec34086c56cb25d0fb0eb784caacb90f26bc361bd9d1
SHA512a9abfa992379866401b4e0a3170ae8d49f50a62d598bced2ff6e5b4a2d6cc81a918bc8f39dc90071d3a8afa009a2d198e507074e633cebf0bca6add5a08aa916
-
Filesize
389B
MD5f00792e701356b98bc216efd1762c0e2
SHA1c46eff7d15b81d63defb3631446987371f9aad63
SHA2569ca43d321b1403131c8d801e143a886c9de3389f90a126fd36aff49e2f00b0b1
SHA512951222dfdf7c0a6271bc62f6e2c234a01918e429051a0caec987b6d8d6fbc0f01920e1fa5b1c11ab22651be0a039a7451bd550ecf54e029ff8c962c124cf72fb
-
Filesize
230KB
MD54b02b09f32cc63ca7180e37dbb41289b
SHA1bc6bdae7c379fc1917f272d1eed69a8c2eec5a3f
SHA25674a11beef83855b0508e5de91e82060d82ef4dc7c2c756cdd6453bafcbba5fb8
SHA512e6f0eedcf332a021134b0a3a15e310321b235245b44927d7e3ca5505b98f03890b3ad25f0db250f94c2ed15849b21fb8a2f547f2a05d4d931e6ea79f478d8378