Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 02:18

General

  • Target

    f907e36db4d021c03735eef63ec11d0e4a86a5831a74cd367d78fe773ee144b4.exe

  • Size

    84KB

  • MD5

    3b89f5fff7b469730dcb838ad1036eed

  • SHA1

    6bb31fc9b268422ac6b2e4894f8d7360d7051381

  • SHA256

    f907e36db4d021c03735eef63ec11d0e4a86a5831a74cd367d78fe773ee144b4

  • SHA512

    bc3d4314960662d78694bd32d8335aaf4f057183754155db7a2f51f960bb962a9f373727512e31975f8f56b9f41f1c66f48c6a895b501d86861dc2bffe40854d

  • SSDEEP

    1536:DcIEc5HBkoNhTOWhcPYZxAxMpBd48CArrprdtA2:wIDHNhTOWhcAZxAulJA2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f907e36db4d021c03735eef63ec11d0e4a86a5831a74cd367d78fe773ee144b4.exe
    "C:\Users\Admin\AppData\Local\Temp\f907e36db4d021c03735eef63ec11d0e4a86a5831a74cd367d78fe773ee144b4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\voewea.exe
      "C:\Users\Admin\voewea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\voewea.exe

    Filesize

    84KB

    MD5

    f1568eb3ca852814ffcd86e9ee8300a7

    SHA1

    8fc2cf730390f055d2e31b1431c9a07b6f71cf1f

    SHA256

    2ae46c1f9ee8556a11c3325834e97e41f8c8c3e707f10fa61ebc0cc723a48694

    SHA512

    627cf33f644f812cd1b04b42387f9dae8419f232dd16573acef3607a96f3e99791ec892aec0fbaf7b040f9604da4c45a3440bfff547bf275b1798567eea8e5a6