Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 00:50

General

  • Target

    Voicemod V2.48/data3.bin

  • Size

    56.1MB

  • MD5

    6f3cc2385b3676dc93a6788ad5ae5501

  • SHA1

    ac0713d2e62dbc2a93fd6fdfa3dce01f0d4a8207

  • SHA256

    c96e6820bdd60531c12b787bf775ec0ea83d5b6f9074b600591082fe9d708ff5

  • SHA512

    a143c832d8148dc8f8e379db9bb2c8b2aa870e5ac60dcedbabc6e447ef8ea628e2ccb79e11a778768405c1996606460a1fd7b666b768dd17bf8d6b85150eefc3

  • SSDEEP

    1572864:EplSZtRPP0Sq0HxvPnXoJW5fo/k+dcvGf+YFMRJ:EbSLRnzq0RvPXoJcos+dcORML

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Voicemod V2.48\data3.bin"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Voicemod V2.48\data3.bin
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Voicemod V2.48\data3.bin"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2628

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    b2c487536a1d059f3485ed5a02288a0a

    SHA1

    cfcd5b4cd6d1c95bde3a46fd4023fa9bcb9ffc25

    SHA256

    fa794f98f133d906d5af62b090f8d4a5b588d0dea4db54cc59254423b520b02b

    SHA512

    5dc2553610e5250de8f7c228e6d7eba766c3af8828e8684781c35cd8f2d76bdcb9fb1aeb416dc31a4dc7b3e75c352b2eb979e36f189a9b41d270ffb1bb633edd