Analysis
-
max time kernel
1621s -
max time network
1627s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/04/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
ProtonVPN_win_v2.4.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ProtonVPN_win_v2.4.1.exe
Resource
win10v2004-20230221-en
General
-
Target
ProtonVPN_win_v2.4.1.exe
-
Size
29.9MB
-
MD5
ee2d7372817a833beda001a35d3693a1
-
SHA1
695251a2628c95a6fd9e2b7f3092593723d09594
-
SHA256
c95cf2af65dd0b1556c02cd17952462f02314cf532eec06ebca08328549790ae
-
SHA512
18a6a92e460312b3ee7b76e9bc2be98f47f19cdf84dbbf64d73b5fe70aaec19a22de89ffa73c2b416230f1f91e0b6f929663d3e01bcf59bea978b565390b1dcc
-
SSDEEP
786432:0/e+t2cVTdFIdoTVayXIKbUP/FQUnEIK1/r3:0/es2cRd2+aHKb+dK1/L
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1712 ProtonVPN_win_v2.4.1.exe 1712 ProtonVPN_win_v2.4.1.exe 1620 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\K: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\M: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\Q: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\T: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\F: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\L: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\P: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\V: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\O: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\S: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\U: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\W: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\N: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\X: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\Z: ProtonVPN_win_v2.4.1.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 ProtonVPN_win_v2.4.1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1564 msiexec.exe Token: SeTakeOwnershipPrivilege 1564 msiexec.exe Token: SeSecurityPrivilege 1564 msiexec.exe Token: SeCreateTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeAssignPrimaryTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeLockMemoryPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeIncreaseQuotaPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeMachineAccountPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeTcbPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSecurityPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeTakeOwnershipPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeLoadDriverPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemProfilePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemtimePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeProfSingleProcessPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeIncBasePriorityPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreatePagefilePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreatePermanentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeBackupPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeRestorePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeShutdownPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeDebugPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeAuditPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemEnvironmentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeChangeNotifyPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeRemoteShutdownPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeUndockPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSyncAgentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeEnableDelegationPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeManageVolumePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeImpersonatePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreateGlobalPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreateTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeAssignPrimaryTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeLockMemoryPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeIncreaseQuotaPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeMachineAccountPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeTcbPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSecurityPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeTakeOwnershipPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeLoadDriverPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemProfilePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemtimePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeProfSingleProcessPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeIncBasePriorityPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreatePagefilePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreatePermanentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeBackupPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeRestorePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeShutdownPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeDebugPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeAuditPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSystemEnvironmentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeChangeNotifyPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeRemoteShutdownPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeUndockPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeSyncAgentPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeEnableDelegationPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeManageVolumePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeImpersonatePrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreateGlobalPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeCreateTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeAssignPrimaryTokenPrivilege 1712 ProtonVPN_win_v2.4.1.exe Token: SeLockMemoryPrivilege 1712 ProtonVPN_win_v2.4.1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 ProtonVPN_win_v2.4.1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28 PID 1564 wrote to memory of 1620 1564 msiexec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ProtonVPN_win_v2.4.1.exe"C:\Users\Admin\AppData\Local\Temp\ProtonVPN_win_v2.4.1.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1712
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 27D081A80349FC43B685A7DC2733B724 C2⤵
- Loads dropped DLL
PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
152KB
MD519e61f2dfd494cd64a9cfba3d4afe964
SHA11ba29dafa629be32ac85dd68a4c5bac261c46a88
SHA256f7c03fa72a65dd9f9fd2abce0510d75933db3355ada0733f71ecaf7caae74f97
SHA512392aeda85bbc0a5c69178cd44866408fda2bc4607348b6779124473a7099446359eaf8b2ee1e8121dfd0b7a0da6e8cf6f383729da94fb1a3ed3767dc3a6e15eb
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Local\Temp\{47D5ABCD-76F6-412A-84BB-9022A287E6BC}\287E6BC\ProtonVPN_win_v2.4.1.msi
Filesize20.2MB
MD523f000183642d33695a4bb6e1826cd6c
SHA11a2d193046f1cb079f1cf993f30d93275ccecac6
SHA256b5dbdd619c1acb41382b1d4515f2e2bb30afde3e091bdfb2b76f4d0ceaefce7f
SHA5124249fae7682f4b7276e096f7c713890e40748bb2a68002559cd46345421a363f1d36e6aba01e32fd535049d45b5d608c748c191d82a7ec2f636f23d9dbcc4b45
-
Filesize
215KB
MD57117e33f9b1dc041b477060f8f8c3a0c
SHA197fbcb6676bfb43d36701805c86eac3567f61bca
SHA256a350f06808b517dd2b7f363dca6119c072d08d1677e379ce48267bc7d95f1517
SHA51231f484d210e575dc8f522d1b3c16d2a77601be172287d8f7ff009a5700820e028c9c1366d543872edaec002a7e2e5fe5880ad303cde8d28a60fe0359db4307fe
-
Filesize
554KB
MD53b171ce087bb799aafcbbd93bab27f71
SHA17bd69efbc7797bdff5510830ca2cc817c8b86d08
SHA256bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4
SHA5127700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38
-
Filesize
215KB
MD57117e33f9b1dc041b477060f8f8c3a0c
SHA197fbcb6676bfb43d36701805c86eac3567f61bca
SHA256a350f06808b517dd2b7f363dca6119c072d08d1677e379ce48267bc7d95f1517
SHA51231f484d210e575dc8f522d1b3c16d2a77601be172287d8f7ff009a5700820e028c9c1366d543872edaec002a7e2e5fe5880ad303cde8d28a60fe0359db4307fe
-
Filesize
215KB
MD57117e33f9b1dc041b477060f8f8c3a0c
SHA197fbcb6676bfb43d36701805c86eac3567f61bca
SHA256a350f06808b517dd2b7f363dca6119c072d08d1677e379ce48267bc7d95f1517
SHA51231f484d210e575dc8f522d1b3c16d2a77601be172287d8f7ff009a5700820e028c9c1366d543872edaec002a7e2e5fe5880ad303cde8d28a60fe0359db4307fe