Analysis
-
max time kernel
102s -
max time network
91s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-04-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
Voice.ai-Downloader.exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240426-en
General
-
Target
Voice.ai-Downloader.exe
-
Size
477KB
-
MD5
40ffaea0c96bc8fd1ac022ecf287980b
-
SHA1
c9ff64fecee39aa1a4f1c930d6b6ad423e1b1c14
-
SHA256
100dba151efe66c842fde4337857fd3db4568c1e3ee008e412927e67ed72094e
-
SHA512
cc0f2ff6b650644564d7469031c96fcaf93b9dd82318eda244abb65970d2e5697ba27bb0c62e31f4f654cc031ac7f19f0692f444674fd174f9acbc201c8944dd
-
SSDEEP
3072:ckBGWOsTIJgIDU5A/cNo68pMABlZQ2wpFD0ra42L5GYDxJ0ytta:c1ssjH5Mp2w7g+42LUS6
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Voice.ai\VoiceAI-Installer.exe Voice.ai-Downloader.exe File opened for modification C:\Program Files\Voice.ai\ Voice.ai-Downloader.exe File created C:\Program Files\Voice.ai\meta Voice.ai-Downloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Voice.ai-Downloader.exe Key created \REGISTRY\USER\S-1-5-21-734199974-1358367239-436541239-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Voice.ai-Downloader.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe 5052 Voice.ai-Downloader.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
Filesize
12KB
MD5792b6f86e296d3904285b2bf67ccd7e0
SHA1966b16f84697552747e0ddd19a4ba8ab5083af31
SHA256c7a20bcaa0197aedddc8e4797bbb33fdf70d980f5e83c203d148121c2106d917
SHA51297edc3410b88ca31abc0af0324258d2b59127047810947d0fb5e7e12957db34d206ffd70a0456add3a26b0546643ff0234124b08423c2c9ffe9bdec6eb210f2c
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b