Overview
overview
10Static
static
3voicemod p...exe.7z
windows7-x64
7voicemod p...exe.7z
windows10-2004-x64
1voicemod p...ck.exe
windows7-x64
10voicemod p...ck.exe
windows10-2004-x64
10$TEMP/Casino.xll
windows7-x64
3$TEMP/Casino.xll
windows10-2004-x64
1$TEMP/Centers.xll
windows7-x64
3$TEMP/Centers.xll
windows10-2004-x64
1$TEMP/Fe.xll
windows7-x64
3$TEMP/Fe.xll
windows10-2004-x64
1$TEMP/Nerve.cab
windows7-x64
1$TEMP/Nerve.cab
windows10-2004-x64
1Bright
windows7-x64
1Bright
windows10-2004-x64
1Consultancy
windows7-x64
1Consultancy
windows10-2004-x64
1Despite
windows7-x64
1Despite
windows10-2004-x64
1Henry
windows7-x64
1Henry
windows10-2004-x64
1Marc
windows7-x64
1Marc
windows10-2004-x64
1Pod
windows7-x64
1Pod
windows10-2004-x64
1Sanyo
windows7-x64
1Sanyo
windows10-2004-x64
1Society
windows7-x64
1Society
windows10-2004-x64
1Urge
windows7-x64
1Urge
windows10-2004-x64
1Word
windows7-x64
1Word
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
voicemod pro 1.2.2.7 crack.exe.7z
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
voicemod pro 1.2.2.7 crack.exe.7z
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
voicemod pro 1.2.2.7 crack.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
voicemod pro 1.2.2.7 crack.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$TEMP/Casino.xll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/Casino.xll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$TEMP/Centers.xll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/Centers.xll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$TEMP/Fe.xll
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
$TEMP/Fe.xll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$TEMP/Nerve.cab
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/Nerve.cab
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Bright
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Bright
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Consultancy
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Consultancy
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Despite
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Despite
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Henry
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Henry
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Marc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Marc
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Pod
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Pod
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Sanyo
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
Sanyo
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Society
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Society
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Urge
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
Urge
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Word
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Word
Resource
win10v2004-20250217-en
General
-
Target
$TEMP/Fe.xll
-
Size
86KB
-
MD5
210634d53ffb4443a5ca36ba0cbe5be7
-
SHA1
64e3a18c6fa33c669d7e2cb029ad9bb990a37a20
-
SHA256
c351fdbde77eefc8113e8b1949f5794c36b53bc722356fb778e5ded601be3cd6
-
SHA512
368b9e04aaa4f1e405dc943095984c98572e4c264f9af10cc6c59807c5872be8bced8fadd6e30ee5d44ee86ba58668a916a63b32e4a9a81d98c454defdcd72e0
-
SSDEEP
1536:8p3O6su41jfyM/GFs/6OJpMorRwi0b+Q4WrLkHh23fa7E6ck/:8pD3+l60WOwi0qQXrLkH034EDG
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Fe.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5b74c89342d2a1cc41984989304018439
SHA1268ef6202d32e50fa118502848f5427acedef9b1
SHA256dff5997ad1432aabf92d01407f0e9c42006afeba61af20d5d6938cece08e8f17
SHA512764a2193344fe152961f71e0c167f1c42824f194a216c9b675bfceb2faea87cf2c0b3742d5adb1ca68024a2830abec013f52709204bfe3fb6a36586c985d9692