Analysis

  • max time kernel
    155s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2022 17:39

General

  • Target

    LOCALES/PROTONVP.exe

  • Size

    26.9MB

  • MD5

    e751f97a3d99007fd4f3bade78df78a1

  • SHA1

    ec8be5c865e959b8675667a689851c2683e5c8d0

  • SHA256

    b6db90130e99b34b6b28cd48c244b5c897baaa6f5cb200f83feb74d32614a3e3

  • SHA512

    209ddb2fcd2ac2109ac517cf2608580286c7aa07ba876611caace0a057608112299468b7c1ff7b29ddbcfeabb7f037fed2cb64b622fe4fe925ef512d9725a5bd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LOCALES\PROTONVP.exe
    "C:\Users\Admin\AppData\Local\Temp\LOCALES\PROTONVP.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4876
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B4B7F5091CE5E5A29D9DC29B25F0B749 C
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3468

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSI9364.tmp
    Filesize

    912KB

    MD5

    b15dbf4b35cd1460ba283795e24878c8

    SHA1

    327812be4bfdce7a87cb00fab432ecc0d8c38c1e

    SHA256

    0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

    SHA512

    95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

  • C:\Users\Admin\AppData\Local\Temp\MSI9364.tmp
    Filesize

    912KB

    MD5

    b15dbf4b35cd1460ba283795e24878c8

    SHA1

    327812be4bfdce7a87cb00fab432ecc0d8c38c1e

    SHA256

    0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

    SHA512

    95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

  • C:\Users\Admin\AppData\Local\Temp\MSIA0B6.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA0B6.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA855.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA855.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA875.tmp
    Filesize

    286KB

    MD5

    14f0b05cb8e7212880d123c43b0b7001

    SHA1

    d2aa68810af43af3d7a62ef8a9494d469f3144e3

    SHA256

    9316df9f9b01b95033fa5ab5395c3ec9fa0da1aaf2ab0d6f0d3a648ad0459392

    SHA512

    546d5d37256ad91eba47633b5bf57f1653bf2c183087b4e078c87c9b712b56cf7e6be1e24529ab7d01e2ea6fc105252f1ce614092dc7eaf475e41080bc1a2a8c

  • C:\Users\Admin\AppData\Local\Temp\MSIA875.tmp
    Filesize

    286KB

    MD5

    14f0b05cb8e7212880d123c43b0b7001

    SHA1

    d2aa68810af43af3d7a62ef8a9494d469f3144e3

    SHA256

    9316df9f9b01b95033fa5ab5395c3ec9fa0da1aaf2ab0d6f0d3a648ad0459392

    SHA512

    546d5d37256ad91eba47633b5bf57f1653bf2c183087b4e078c87c9b712b56cf7e6be1e24529ab7d01e2ea6fc105252f1ce614092dc7eaf475e41080bc1a2a8c

  • C:\Users\Admin\AppData\Local\Temp\MSIA8F3.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA8F3.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA933.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA933.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA9B1.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIA9B1.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIAA7D.tmp
    Filesize

    912KB

    MD5

    b15dbf4b35cd1460ba283795e24878c8

    SHA1

    327812be4bfdce7a87cb00fab432ecc0d8c38c1e

    SHA256

    0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

    SHA512

    95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

  • C:\Users\Admin\AppData\Local\Temp\MSIAA7D.tmp
    Filesize

    912KB

    MD5

    b15dbf4b35cd1460ba283795e24878c8

    SHA1

    327812be4bfdce7a87cb00fab432ecc0d8c38c1e

    SHA256

    0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

    SHA512

    95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

  • C:\Users\Admin\AppData\Local\Temp\MSIAE08.tmp
    Filesize

    602KB

    MD5

    78b793e3f44b2c7849ffe70083c500c0

    SHA1

    9dcbb160c9f606bcdbee9ad572aaab1ad1b24d61

    SHA256

    fbcf7c3645d90621bfbbf38e660a510dd0731b02b6e7820b075116e944301174

    SHA512

    36d0fadd2a55231ce159519ca4bfb56fee038ee82bfbafa375faee17e11e2149ffffb4b364bc80e4ed950325e0c31e6a02244c591a0b983c7ccc039e94a3e9c8

  • C:\Users\Admin\AppData\Local\Temp\MSIAE08.tmp
    Filesize

    602KB

    MD5

    78b793e3f44b2c7849ffe70083c500c0

    SHA1

    9dcbb160c9f606bcdbee9ad572aaab1ad1b24d61

    SHA256

    fbcf7c3645d90621bfbbf38e660a510dd0731b02b6e7820b075116e944301174

    SHA512

    36d0fadd2a55231ce159519ca4bfb56fee038ee82bfbafa375faee17e11e2149ffffb4b364bc80e4ed950325e0c31e6a02244c591a0b983c7ccc039e94a3e9c8

  • C:\Users\Admin\AppData\Local\Temp\MSIAEA5.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\MSIAEA5.tmp
    Filesize

    495KB

    MD5

    cfab78ac0d042a1d8ad7085a94328ef6

    SHA1

    b3070cc847ba2739450dc9bd05040df83e7d85d2

    SHA256

    17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

    SHA512

    647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

  • C:\Users\Admin\AppData\Local\Temp\{78E8B570-4551-416B-8F87-6917E1EBBAF9}\decoder.dll
    Filesize

    206KB

    MD5

    899944fb96ccc34cfbd2ccb9134367c5

    SHA1

    7c46aa3f84ba5da95ceff39cd49185672f963538

    SHA256

    780d10eda2b9a0a10bf844a7c8b6b350aa541c5bbd24022ff34f99201f9e9259

    SHA512

    2c41181f9af540b4637f418fc148d41d7c38202fb691b56650085fe5a9bdba068275ff07e002e1044760754876c62d7b4fc856452af80a02c5f5a9a7dc75b5e0

  • C:\Users\Admin\AppData\Local\Temp\{78E8B570-4551-416B-8F87-6917E1EBBAF9}\decoder.dll
    Filesize

    206KB

    MD5

    899944fb96ccc34cfbd2ccb9134367c5

    SHA1

    7c46aa3f84ba5da95ceff39cd49185672f963538

    SHA256

    780d10eda2b9a0a10bf844a7c8b6b350aa541c5bbd24022ff34f99201f9e9259

    SHA512

    2c41181f9af540b4637f418fc148d41d7c38202fb691b56650085fe5a9bdba068275ff07e002e1044760754876c62d7b4fc856452af80a02c5f5a9a7dc75b5e0

  • memory/3468-134-0x0000000000000000-mapping.dmp