Analysis

  • max time kernel
    95s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 15:45

General

  • Target

    ProtonVPN.msi

  • Size

    1.5MB

  • MD5

    926ec22b8ba727571a2f85148489fd85

  • SHA1

    e6cb03d143489f3af01575de4ea917b680109105

  • SHA256

    aba77fcc24b7172206eda1a7f47eff0e0f2fe6ad988536d995ab38ee1a28e783

  • SHA512

    c1a344377997ebb354d2bf0c916744a28723aa0845a4cb4a6b59eb6be4317f205386628b4a7bba5baba47203a628c843190de64532dc5496c8396a738da8407a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ProtonVPN.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1488
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 53C705522E5E5E7D469FC97371D976C1
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1376
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:1536
      • C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:792
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1960
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000574" "0000000000000584"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files.cab

    Filesize

    1.1MB

    MD5

    11983dda7f04b10dde29656cd05e119f

    SHA1

    c43dfb4a404b183cf7b69120224329aa22b598d5

    SHA256

    9a47c85b7508ede06caefc61cfdf5a9f3b757dd64cf41cf7dbe25c72c17b059b

    SHA512

    3ba1821de94ac45dfffe0a868ba2e21de3ce96bf8a1c02fc1be6e19ce638f118f78248c5fb04b33569e59b768d572c7cc7bc280083d4586339a83a4321c7eae8

  • C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • C:\Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\msiwrapper.ini

    Filesize

    1KB

    MD5

    1ddbaeddbd8c2eb8223a962ef4936fcc

    SHA1

    fcc74bb7692a8f4124493adb56096337247ef765

    SHA256

    2482ae74e5bfa92d5b17b2d269af3575ade6909b4ae0a9b5a28be9f55ee5ec43

    SHA512

    74a104f9ecc73181aa244af629ca6bacdfb42bbf18a767080242ab23c346cbdf53b802944ba638af290552d92987947c2ec7a5ee074525a3e26fa180c746241f

  • C:\Windows\Installer\MSI70AE.tmp

    Filesize

    208KB

    MD5

    4caaa03e0b59ca60a3d34674b732b702

    SHA1

    ee80c8f4684055ac8960b9720fb108be07e1d10c

    SHA256

    d01af2b8c692dffb04a5a04e3ccd0d0a3b2c67c8fc45a4b68c0a065b4e64cc3d

    SHA512

    25888848871286bdd1f9c43a0fba35640edb5bafbe0c6aa2f9708a070ea4e5b16745b7c4f744ae4f5643f75ef47f196d430bf70921ed27715f712825ec590a34

  • \Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • \Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • \Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • \Users\Admin\AppData\Local\Temp\MW-28d2a5e3-5e32-47e4-aca0-c69a9d8a7e1b\files\X5C2FUk80DDy5JAd.exe

    Filesize

    1.6MB

    MD5

    fb0e77955a8b400a73e4156d1d66e860

    SHA1

    0eb0910fba5418dffeb59ccf7cff5bb2af4d9ebb

    SHA256

    ab3110124ba23e717a71eedbcf44197b20308efa621118dd4fcc936a8976cdfa

    SHA512

    bad2a0b4b1df892c21085985452bd1bd7a314f697813ae2199c734c3432b1beb23a0039b8629e4ab27c57eb79c6996d6b2d30f33804608e33280f7031f77af12

  • \Windows\Installer\MSI70AE.tmp

    Filesize

    208KB

    MD5

    4caaa03e0b59ca60a3d34674b732b702

    SHA1

    ee80c8f4684055ac8960b9720fb108be07e1d10c

    SHA256

    d01af2b8c692dffb04a5a04e3ccd0d0a3b2c67c8fc45a4b68c0a065b4e64cc3d

    SHA512

    25888848871286bdd1f9c43a0fba35640edb5bafbe0c6aa2f9708a070ea4e5b16745b7c4f744ae4f5643f75ef47f196d430bf70921ed27715f712825ec590a34

  • memory/792-73-0x0000000002280000-0x00000000023CF000-memory.dmp

    Filesize

    1.3MB

  • memory/792-69-0x0000000000000000-mapping.dmp

  • memory/792-71-0x0000000001E80000-0x0000000002279000-memory.dmp

    Filesize

    4.0MB

  • memory/792-72-0x0000000001E80000-0x0000000002279000-memory.dmp

    Filesize

    4.0MB

  • memory/792-74-0x0000000002280000-0x00000000023CF000-memory.dmp

    Filesize

    1.3MB

  • memory/792-75-0x0000000001E80000-0x0000000002279000-memory.dmp

    Filesize

    4.0MB

  • memory/792-76-0x0000000002280000-0x00000000023CF000-memory.dmp

    Filesize

    1.3MB

  • memory/1376-60-0x0000000000000000-mapping.dmp

  • memory/1488-54-0x000007FEFB9F1000-0x000007FEFB9F3000-memory.dmp

    Filesize

    8KB

  • memory/1536-63-0x0000000000000000-mapping.dmp

  • memory/1972-57-0x0000000075271000-0x0000000075273000-memory.dmp

    Filesize

    8KB

  • memory/1972-56-0x0000000000000000-mapping.dmp