Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20240729-en -
resource tags
arch:x64arch:x86image:win11-20240729-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/07/2024, 08:24
Behavioral task
behavioral1
Sample
VoiceMod-Full-Version-Setup/Voicemod_setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
VoiceMod-Full-Version-Setup/Voicemod_setup.exe
Resource
win11-20240729-en
General
-
Target
VoiceMod-Full-Version-Setup/Voicemod_setup.exe
-
Size
146KB
-
MD5
3d49478072bf18339ef810c8ea7546b2
-
SHA1
c1047d72d4cdce21af4bb989ad1bee437edb7f80
-
SHA256
e3300e30997c5a355f02ca6972711b2ca843d00a393b62c75818a43c27ff128d
-
SHA512
f47f6a1c51b92cc34a1dc264bc2b151690f1c314c5f97b08530e9efd6929c860985f9410f411cb31e0f3acd75b8969e4791ca9fb080901f6f4cb70322255a91c
-
SSDEEP
3072:A6glyuxE4GsUPnliByocWepU0DxwbL2LUnPaZw:A6gDBGpvEByocWeTDxOL2LScw
Malware Config
Extracted
C:\3R9qG8i3Z.README.txt
https://t.me/mr_robot_unlock
Signatures
-
Renames multiple (603) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 4056 E417.tmp -
Executes dropped EXE 1 IoCs
pid Process 4056 E417.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1190969173-1381737754-2099412069-1000\desktop.ini Voicemod_setup.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1190969173-1381737754-2099412069-1000\desktop.ini Voicemod_setup.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PPc49_w86efecst7ectblf7p1yc.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PP20ocrsn5x4ixik9eqtv8is9db.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPh6g5dm_dfoay934ekt8ypei5.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\3R9qG8i3Z.bmp" Voicemod_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\3R9qG8i3Z.bmp" Voicemod_setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4056 E417.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Voicemod_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E417.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000\Control Panel\Desktop Voicemod_setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000\Control Panel\Desktop\WallpaperStyle = "10" Voicemod_setup.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3R9qG8i3Z Voicemod_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.3R9qG8i3Z\ = "3R9qG8i3Z" Voicemod_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3R9qG8i3Z Voicemod_setup.exe Key created \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3R9qG8i3Z\DefaultIcon Voicemod_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\3R9qG8i3Z\DefaultIcon\ = "C:\\ProgramData\\3R9qG8i3Z.ico" Voicemod_setup.exe Key created \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1190969173-1381737754-2099412069-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2644 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1232 ONENOTE.EXE 1232 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe 4636 Voicemod_setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 OpenWith.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp 4056 E417.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeDebugPrivilege 4636 Voicemod_setup.exe Token: 36 4636 Voicemod_setup.exe Token: SeImpersonatePrivilege 4636 Voicemod_setup.exe Token: SeIncBasePriorityPrivilege 4636 Voicemod_setup.exe Token: SeIncreaseQuotaPrivilege 4636 Voicemod_setup.exe Token: 33 4636 Voicemod_setup.exe Token: SeManageVolumePrivilege 4636 Voicemod_setup.exe Token: SeProfSingleProcessPrivilege 4636 Voicemod_setup.exe Token: SeRestorePrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSystemProfilePrivilege 4636 Voicemod_setup.exe Token: SeTakeOwnershipPrivilege 4636 Voicemod_setup.exe Token: SeShutdownPrivilege 4636 Voicemod_setup.exe Token: SeDebugPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeBackupPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe Token: SeSecurityPrivilege 4636 Voicemod_setup.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 1232 ONENOTE.EXE 3316 OpenWith.exe 3788 OpenWith.exe 2016 OpenWith.exe 2536 OpenWith.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1052 4636 Voicemod_setup.exe 84 PID 4636 wrote to memory of 1052 4636 Voicemod_setup.exe 84 PID 2648 wrote to memory of 1232 2648 printfilterpipelinesvc.exe 87 PID 2648 wrote to memory of 1232 2648 printfilterpipelinesvc.exe 87 PID 4636 wrote to memory of 4056 4636 Voicemod_setup.exe 88 PID 4636 wrote to memory of 4056 4636 Voicemod_setup.exe 88 PID 4636 wrote to memory of 4056 4636 Voicemod_setup.exe 88 PID 4636 wrote to memory of 4056 4636 Voicemod_setup.exe 88 PID 4056 wrote to memory of 2692 4056 E417.tmp 89 PID 4056 wrote to memory of 2692 4056 E417.tmp 89 PID 4056 wrote to memory of 2692 4056 E417.tmp 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\VoiceMod-Full-Version-Setup\Voicemod_setup.exe"C:\Users\Admin\AppData\Local\Temp\VoiceMod-Full-Version-Setup\Voicemod_setup.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:1052
-
-
C:\ProgramData\E417.tmp"C:\ProgramData\E417.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\E417.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:572
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{2AD454E7-9AC2-4758-AF0D-AB937F918D2D}.xps" 1336680149622200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1592
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\3R9qG8i3Z.README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2644
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3316
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3788
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD533b2120febb1c1421f8ff4ead0a6313d
SHA18b91f76a089b42f1dd7c66d65161e1dbe8535273
SHA2561107b77481812ab8aa6bbffcc5e5f93237d03379fbe8c6c751f3e10bdb7b028c
SHA512051b030877b2600b562407ccf150a705d0a9d6ad1e97d1e5424c6c3030db2170393bc8d38b2aa2439a78a53f057d80b43668efb5d6bfedc4af50a9b8d819de59
-
Filesize
953B
MD56746d927820d53e67b4c039bed67b671
SHA101f1074c189a3f53afcbb5c57c79258f999e289f
SHA25690d19e7ed22b890ba88a810bcd2f7ac794d24715bb78faf081e05804a03775bb
SHA5123e2665a75cc6155c0f3385b9efa2153110699ec1fe553dda82a8be0b9dd3efb993076de37bbbb5d5707c01a0377f2d8dd89ed501703650edc0bf5336e2f31d49
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
146KB
MD54bdc1018de481a81f9b0d98bd4b92183
SHA18878ea7150260c15121c8bbe9d0f8d61290da524
SHA256b839a78256c7b03405524b49b417a7e080101637823c05fdb4a67ce9d3ce6735
SHA51247ff869bb0ffb6e5329dc099b477473f5c9e2d81df52873d431ba197b412ce4534fc9c52d17552f1d5872d9a9cd87895da774a3859149f4f8c1b604c7595b878
-
Filesize
4KB
MD54ef67b768410c233f3d5a89934a6b6f7
SHA1b8dab6fd4d77d81a189563f6f12a41393926bae3
SHA2563a5a87a73c99332c92cb20c4746a31e3f5ca204831f799a2a6a5143f9247d6fd
SHA512ca5fc4b1aab3b70a84e66eada0574e6a4023e6b5e962e51d6da98b703963d61a1ff77edd8e9c335a4954245b86b6ccd369199547ccb6dffdbdd039489f17fd53
-
Filesize
4KB
MD563149a4d2ef87ad9ba1890d09ce31237
SHA11b74348b8288f079e43a1f53f4d34ca333c2179f
SHA25651621bf7b0d43bb326d90bd06d95261d13e6944c1c4af8c6d40074dfb22fe5a6
SHA512173418a289359b3a5f9dceabfc62806ed355f5a0f178cb74c8577ac8414e5653d6d5a937cb95e5e0c18f8cc4a64c996d98743b3e36fd9d159990e483e840a3b8
-
Filesize
129B
MD5550bed6769e8f26d97329ac29a7b913c
SHA1e276c7b3aeff294a151020532c422a2b17a5ba20
SHA2562c0edb9b5b820c956f4c9a6ff0372ad6ac4921d8c29f954d2bd2a366dad3490f
SHA5120e62af2a09b208f10f15b259dabc08f03e136c1d38d6ada9efcc81fab0bac44c96ce450aba342ac6ac6819529f610963e4a4dd4beb385a5f5aa7f5cd52eabf24