Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 16:53
Behavioral task
behavioral1
Sample
VoidX.exe
Resource
win7-20241010-en
General
-
Target
VoidX.exe
-
Size
63KB
-
MD5
7b22144c81358e8d69e6022bb85c5731
-
SHA1
ff3c1b7d6732698adcb020057f8882636b015a6f
-
SHA256
0271a11d382e2ba93002760a085e7dcfa33d60bbf220c4df1dc0f5a42d4421ae
-
SHA512
5b4270492c4fae229f1b4eaf972978c523912020a91e96c89afd1b1997b331592e723c7897e8cb7e3762faa845dd09a31a29464bea1db6b95128b508f56f27db
-
SSDEEP
1536:Bj3dvh8YWRTRN+eUb/h9zAjruIdpqKmY7:BZJSRTR4eUb/Xu5Gz
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
45.88.91.31:3232
-
delay
1
-
install
true
-
install_file
super sigma.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\super sigma.exe family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VoidX.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation VoidX.exe -
Executes dropped EXE 1 IoCs
Processes:
super sigma.exepid process 4004 super sigma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4516 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
VoidX.exesuper sigma.exepid process 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 1164 VoidX.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe 4004 super sigma.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
VoidX.exesuper sigma.exedescription pid process Token: SeDebugPrivilege 1164 VoidX.exe Token: SeDebugPrivilege 1164 VoidX.exe Token: SeDebugPrivilege 4004 super sigma.exe Token: SeDebugPrivilege 4004 super sigma.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
VoidX.execmd.execmd.exedescription pid process target process PID 1164 wrote to memory of 2044 1164 VoidX.exe cmd.exe PID 1164 wrote to memory of 2044 1164 VoidX.exe cmd.exe PID 1164 wrote to memory of 2844 1164 VoidX.exe cmd.exe PID 1164 wrote to memory of 2844 1164 VoidX.exe cmd.exe PID 2044 wrote to memory of 4592 2044 cmd.exe schtasks.exe PID 2044 wrote to memory of 4592 2044 cmd.exe schtasks.exe PID 2844 wrote to memory of 4516 2844 cmd.exe timeout.exe PID 2844 wrote to memory of 4516 2844 cmd.exe timeout.exe PID 2844 wrote to memory of 4004 2844 cmd.exe super sigma.exe PID 2844 wrote to memory of 4004 2844 cmd.exe super sigma.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VoidX.exe"C:\Users\Admin\AppData\Local\Temp\VoidX.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "super sigma" /tr '"C:\Users\Admin\AppData\Roaming\super sigma.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "super sigma" /tr '"C:\Users\Admin\AppData\Roaming\super sigma.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAC6C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4516 -
C:\Users\Admin\AppData\Roaming\super sigma.exe"C:\Users\Admin\AppData\Roaming\super sigma.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5d7bd2cfd6d8aba4b1cdb4f594ba03e13
SHA102d0fad601b690dd90cb836e7b729c5c71b67258
SHA2565e6707d317465e9961fc96c5a5185d49b1a05255ce33820dc493c0b7bc159782
SHA512e8d5048ce57d888f2f098d8d67fa6e0e812ae8722e6e512985d2491b7c113c41cbafa60a17b2b70e0eb2ed728856073363015984018a273951f482d1b66f400c
-
Filesize
63KB
MD57b22144c81358e8d69e6022bb85c5731
SHA1ff3c1b7d6732698adcb020057f8882636b015a6f
SHA2560271a11d382e2ba93002760a085e7dcfa33d60bbf220c4df1dc0f5a42d4421ae
SHA5125b4270492c4fae229f1b4eaf972978c523912020a91e96c89afd1b1997b331592e723c7897e8cb7e3762faa845dd09a31a29464bea1db6b95128b508f56f27db