Resubmissions

14/07/2024, 01:34

240714-by5xjavbre 7

14/07/2024, 01:27

240714-bt8smavbqa 7

Analysis

  • max time kernel
    300s
  • max time network
    253s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 01:34

General

  • Target

    VoltageRL.exe

  • Size

    139.5MB

  • MD5

    13a2afd34633e72e45cdfc88e65b1dfa

  • SHA1

    679ae3480cffccd096a5310a2b340dce5bf804ea

  • SHA256

    2b159b2094d9616223da9666f779b0a635cd58d886154432efc957cee0148f1c

  • SHA512

    fc3a281450962938bfccd048a8ca82ac4903c577f6926652f013c4e6cdb6efa52fca4bb47afcdfa74e29bb7e3879ef2f746d6f3d42e7a90dc9a8a2d900109c9a

  • SSDEEP

    786432:f14w5ThzHwQBgmoLWv+K18nCzKdo5DTdvfMQr6SSmPuvh8tSIW68:f14kpHwQjCWv+K18CedmVvEQEpcJW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe
    "C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe
      "C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1000 --field-trial-handle=1156,10355734787394163234,5265835327147446479,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2828
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=2260 get ExecutablePath"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where processid=2260 get ExecutablePath
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2488
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\system32\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2532
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "net session"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\system32\net.exe
          net session
          3⤵
            PID:2648
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              4⤵
                PID:2752
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic logicaldisk get size"
            2⤵
              PID:2744
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic logicaldisk get size
                3⤵
                • Collects information from the system
                • Suspicious use of AdjustPrivilegeToken
                PID:2172
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory | more +1"
              2⤵
                PID:2296
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic computersystem get totalphysicalmemory
                  3⤵
                    PID:1644
                  • C:\Windows\system32\more.com
                    more +1
                    3⤵
                      PID:1808
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                    2⤵
                      PID:2524
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic csproduct get uuid
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3012
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "echo %NUMBER_OF_PROCESSORS%"
                      2⤵
                        PID:2520
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"
                        2⤵
                          PID:1648
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic OS get caption, osarchitecture
                            3⤵
                              PID:2348
                            • C:\Windows\system32\more.com
                              more +1
                              3⤵
                                PID:1040
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"
                              2⤵
                                PID:1572
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic cpu get name
                                  3⤵
                                    PID:340
                                  • C:\Windows\system32\more.com
                                    more +1
                                    3⤵
                                      PID:680
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"
                                    2⤵
                                      PID:1508
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic PATH Win32_VideoController get name
                                        3⤵
                                        • Detects videocard installed
                                        PID:948
                                      • C:\Windows\system32\more.com
                                        more +1
                                        3⤵
                                          PID:408
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                        2⤵
                                          PID:1532
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1968
                                        • C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe
                                          "C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --mojo-platform-channel-handle=1524 --field-trial-handle=1156,10355734787394163234,5265835327147446479,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1988
                                        • C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe
                                          "C:\Users\Admin\AppData\Local\Temp\VoltageRL.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1664 --field-trial-handle=1156,10355734787394163234,5265835327147446479,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                          2⤵
                                            PID:2432

                                        Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • \Users\Admin\AppData\Local\Temp\53193fcf-09ac-452e-bfd8-e1364a97d97a.tmp.node

                                                Filesize

                                                643KB

                                                MD5

                                                c1f4c56a883a4c1c4d5525c86d8e0677

                                                SHA1

                                                b80b2fac20e73df315f8b460f79328b70ae98256

                                                SHA256

                                                c0cabb374090c17dc4e187f29b888655e94e6442f1f7d10756d2b63f7bc59019

                                                SHA512

                                                4814ef15dfbfbc07dd4464c25070199246ab3b81bf280c13372d66c73375d1ab05d2161d39b88923826b340a85fc06a632f3f73933bf60f293901a0fa16e36d9

                                              • \Users\Admin\AppData\Local\Temp\748bc4cd-3319-4d9c-9a8b-24ad5d6a7368.tmp.node

                                                Filesize

                                                1.8MB

                                                MD5

                                                3072b68e3c226aff39e6782d025f25a8

                                                SHA1

                                                cf559196d74fa490ac8ce192db222c9f5c5a006a

                                                SHA256

                                                7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                                SHA512

                                                61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                              • memory/1968-74-0x000000001B590000-0x000000001B872000-memory.dmp

                                                Filesize

                                                2.9MB

                                              • memory/1968-75-0x0000000002720000-0x0000000002728000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/2828-9-0x0000000000860000-0x0000000000861000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2828-41-0x0000000077010000-0x0000000077011000-memory.dmp

                                                Filesize

                                                4KB