Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 00:07
Behavioral task
behavioral1
Sample
VoidNETFree/API.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VoidNETFree/API.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
VoidNETFree/VoidNET-free.py
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
VoidNETFree/VoidNET-free.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
VoidNETFree/VoidNET-starter.bat
Resource
win7-20240221-en
General
-
Target
VoidNETFree/API.exe
-
Size
6.6MB
-
MD5
07fcda5e8c88548ab30e7a26b0304d8a
-
SHA1
b6abf49f34ab1465cd6f671b2148e5ddcaa2f152
-
SHA256
0c89c0d06ecfe89860ff6defd3e22a0b707b253f2f23f80192b3b3b9a1b28458
-
SHA512
cd6cb17854b0e47efb7325f22d119976a1a6fefd968e601ad0869c2467fc83f395bac237536d009aa8aac5fa22a594c711c05498019436f3503a6e7d90680b92
-
SSDEEP
196608:Yry7bJ7hEDOYjJlpZstQoS9Hf12VKXPXC9b8CuVj:5lEBpGt7G/Moy9bkj
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2408 API.exe 2408 API.exe 2408 API.exe 2408 API.exe 2408 API.exe 2408 API.exe 2408 API.exe -
resource yara_rule behavioral1/files/0x000500000001951e-73.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2408 2192 API.exe 29 PID 2192 wrote to memory of 2408 2192 API.exe 29 PID 2192 wrote to memory of 2408 2192 API.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\VoidNETFree\API.exe"C:\Users\Admin\AppData\Local\Temp\VoidNETFree\API.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\VoidNETFree\API.exe"C:\Users\Admin\AppData\Local\Temp\VoidNETFree\API.exe"2⤵
- Loads dropped DLL
PID:2408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD54c9bf992ae40c7460a029b1046a7fb5e
SHA179e13947af1d603c964cce3b225306cadff4058b
SHA25618655793b4d489f769327e3c8710aced6b763c7873b6a8dc5ae6f28d228647f4
SHA512c36d455ac79a73758f6090977c204764a88e929e8eaa7ce27a9c9920451c014e84ae98beb447e8345a8fa186b8c668b076c0ed27047a0e23ad2eeaf2cbc3a8d8
-
Filesize
20KB
MD59d8e7a90dd0d54b7ccde435b977ee46d
SHA115cd12089c63f4147648856b16193cf014e6764f
SHA256dc570708327c4c8419d4cced2a162d7ca112a168301134dd1fb5e2040eee45b6
SHA512339fe195602355bce26a2526613a212271e7f8c7518d591b9e3c795c154d93b29b8c524b2c3678c799d0ea0101eabea918564e49def0b915af0619e975f1c34b
-
Filesize
20KB
MD5d399c926466f044f183faa723ba59120
SHA1a9534b4910888d70eefba6fcc3376f2549cb4a05
SHA25619b018be16afe143fb107ef1dd5b8e6c6cb45966806eb3d31ec09ff0dc2b70d1
SHA512fc55f4cfe7c6c63e0720971d920c5c6ead4db74a671f7bb8dc830aa87cb54459a62e974456875bdfda449d82a0acb368e3b6c2cc20c32b1b407e8de7cc532057
-
Filesize
20KB
MD5ea5f768b9a1664884ae4ae62cec90678
SHA1ae08e80431da7f4e8f1e5457c255cc360ef1cac0
SHA25624f4530debf2161e0d0256f923b836aeccc3278a6ff2c9400e415600276b5a6d
SHA512411db31e994ebbc69971972e45d6e51186d8f8790e8c67660b6a846e48a5a5c53a113916a5a15d14c33d8c88037d7f252135e699cb526c4bb3b5abd2e2dfee7c
-
Filesize
1.4MB
MD5b93eda8cc111a5bde906505224b717c3
SHA15f1ae1ab1a3c4c023ea8138d4b09cbc1cd8e8f9e
SHA256efa27cd726dbf3bf2448476a993dc0d5ffb0264032bf83a72295ab3fc5bcd983
SHA512b20195930967b4dc9f60c15d9ceae4d577b00095f07bd93aa4f292b94a2e5601d605659e95d5168c1c2d85dc87a54d27775f8f20ebcacf56904e4aa30f1affba
-
Filesize
1.1MB
MD5b0397bb83c9d579224e464eebf40a090
SHA181efdfe57225dfe581aafb930347535f08f2f4ce
SHA256d2ebd8719455ae4634d00fd0d0eb0c3ad75054fee4ff545346a1524e5d7e3a66
SHA512e72a4378ed93cfb3da60d69af8103a0dcb9a69a86ee42f004db29771b00a606fbc9cbc37f3daa155d1d5fe85f82c87ca9898a39c7274462fcf5c4420f0581ab3
-
Filesize
20KB
MD5b59d773b0848785a76baba82d3f775fa
SHA11b8dcd7f0e2ab0ba9ba302aa4e9c4bfa8da74a82
SHA2560dc1f695befddb8ee52a308801410f2f1d115fc70668131075c2dbcfa0b6f9a0
SHA512cbd52ed8a7471187d74367aa03bf097d9eac3e0d6dc64baf835744a09da0b050537ea6092dcb8b1e0365427e7f27315be2145c6f853ef936755ad07ef17d4a26