Analysis
-
max time kernel
88s -
max time network
90s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
Vixous_INI_New.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
Vixous_INI_New.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Vixous_INI_New.exe
Resource
win11-20240214-en
General
-
Target
Vixous_INI_New.exe
-
Size
6.3MB
-
MD5
65ad90abd04a273e866eff97e4e82aad
-
SHA1
d21e12ffb3b0234e8d22acba8d86ea4d3444937a
-
SHA256
a9113f7b226a05cfcc7f205a92d2078e15966ec6081a1bd77e709e4ee781ed5f
-
SHA512
8b3fb8d17073b44571646d56024422f8f254bc3b7c87fde970735a2cfef3319095f9fd19c0467271c0dec97d44a9de0cf0a2ba7f106971639439900c4375437e
-
SSDEEP
196608:AVhesUqB9eqM25qSjNlBhbWcjOGtsTxgCs9f5d/h7:iYfqBNMGqANluCvsTK57
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 616 Vixous_INI_New.exe 4896 Vixous_INI_New.exe -
Loads dropped DLL 1 IoCs
pid Process 4896 Vixous_INI_New.exe -
Drops file in System32 directory 43 IoCs
description ioc Process File opened for modification C:\Windows\System32\KERNELBASE.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\RPCRT4.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\msvcrt.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\ws2_32.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\KERNEL32.DLL Vixous_INI_New.exe File opened for modification C:\Windows\System32\gdi32full.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\advapi32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\imagehlp.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll Vixous_INI_New.exe File opened for modification C:\Windows\system32\explorerframe.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\GDI32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\ucrtbase.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\MSCTF.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\msvcp_win.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\oleaut32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\ole32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\comdlg32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\shcore.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\imm32.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\shlwapi.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\clbcatq.dll Vixous_INI_New.exe File opened for modification C:\Windows\system32\shfolder.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\shell32.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\version.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\dxcore.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\profapi.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\user32.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\win32u.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\wintypes.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\combase.dll Vixous_INI_New.exe File opened for modification C:\Windows\System32\psapi.dll Vixous_INI_New.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx Vixous_INI_New.exe File opened for modification C:\Windows\System32\sechost.dll Vixous_INI_New.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.22000.120_none_9d947278b86cc467\comctl32.dll Vixous_INI_New.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4896 Vixous_INI_New.exe 4896 Vixous_INI_New.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 4896 Vixous_INI_New.exe Token: SeTcbPrivilege 4896 Vixous_INI_New.exe Token: SeTcbPrivilege 4896 Vixous_INI_New.exe Token: SeLoadDriverPrivilege 4896 Vixous_INI_New.exe Token: SeCreateGlobalPrivilege 4896 Vixous_INI_New.exe Token: SeLockMemoryPrivilege 4896 Vixous_INI_New.exe Token: 33 4896 Vixous_INI_New.exe Token: SeSecurityPrivilege 4896 Vixous_INI_New.exe Token: SeTakeOwnershipPrivilege 4896 Vixous_INI_New.exe Token: SeManageVolumePrivilege 4896 Vixous_INI_New.exe Token: SeBackupPrivilege 4896 Vixous_INI_New.exe Token: SeCreatePagefilePrivilege 4896 Vixous_INI_New.exe Token: SeShutdownPrivilege 4896 Vixous_INI_New.exe Token: SeRestorePrivilege 4896 Vixous_INI_New.exe Token: 33 4896 Vixous_INI_New.exe Token: SeIncBasePriorityPrivilege 4896 Vixous_INI_New.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4896 Vixous_INI_New.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2632 wrote to memory of 616 2632 Vixous_INI_New.exe 79 PID 2632 wrote to memory of 616 2632 Vixous_INI_New.exe 79 PID 2632 wrote to memory of 616 2632 Vixous_INI_New.exe 79 PID 616 wrote to memory of 4896 616 Vixous_INI_New.exe 80 PID 616 wrote to memory of 4896 616 Vixous_INI_New.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vixous_INI_New.exe"C:\Users\Admin\AppData\Local\Temp\Vixous_INI_New.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6169.tmp\Vixous_INI_New.exe"C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6169.tmp\Vixous_INI_New.exe" -ORIGIN:"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6169.tmp\extracted\Vixous_INI_New.exeC:\Users\Admin\AppData\Local\Temp\cetrainers\CET6169.tmp\extracted\Vixous_INI_New.exe "C:\Users\Admin\AppData\Local\Temp\cetrainers\CET6169.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Users\Admin\AppData\Local\Temp\"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4896
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5407f8ffefb4ef6ea00bcf00b3cae3958
SHA10c3da22da979cfdf89ed8b23b7c8bd4c64b2f012
SHA256966021f3c08fdb584d5838724d92a6cd3518aded21207874a4dcc49a82ffa14e
SHA512f98e9314679089fe20661dc3c3ee691275c75bf8e5c026b370d9e0fa64d09fcb0dfe409aa817d58e04a6bffe4c184a9170a4153707fda51f71d51d33ba37bfde
-
Filesize
189KB
MD5a65c29111a4cf5a7fdd5a9d79f77bcab
SHA1c0c59b1f792c975558c33a3b7cf0d94adc636660
SHA256dab3003436b6861ae220cc5fdcb97970fc05afdf114c2f91e46eed627ce3d6af
SHA512b37ef3351e8f46f7183550254acce99b54e0199fc37a02cca78b471dc2d8b697769afdaf7e6cfe89422cfed65a8dcc6d158ef52aba5b0ac9350ea05607fefd7f
-
Filesize
334KB
MD5985920df0fd9aa4b0a5ed4f72198efa3
SHA1fbfb0478c99007deaa307b99d01e2f2944f0b544
SHA256f940df757d1c7dd3d877a49f0ae6dd869c798b6b059f46f2aedcf27773eab979
SHA512c7384802014ac3fa666013177170e25aecd8150a94482f2ff6fad5bd482f751a2df6cc800cfe6ffb4cd9f74c52ab31bdb0584122850eaf5ce15f5473fae1fd7e
-
Filesize
7.8MB
MD59008b7b15fe36382b38985de117956a4
SHA15e11bff1ae8bb969eedf96ef15fa084ba67d7018
SHA256aeb69290c02af0fbf7c7897d05a61c4cc4b13d9d9cdf4535219df9616f85aecd
SHA51299fe89c734e09ac670066e065be19a6082dd7ae857a84367d942dd76dcad51903912b9749abefb1aa856b7c30ead1bb8f4d13ba6e5222e53b575ee5b971cab32
-
Filesize
9.6MB
MD5debad3ac36b2159e246efa7c37c407f4
SHA136d92c1eb1f8374b9784eef94d07a56f79fe653c
SHA256b7afd6298af35099520626facb16c126c05b33d44c5ffbe53efffe0cd1fa205f
SHA512d03d519b7d59defbb76f0f28624b2d6fa0e8a2936b242706c646c0aa4bbd7537019482f75805a062117211c6ed28fc734b06c64d12b4f06253ad9100c0f9432e
-
Filesize
11KB
MD550ddb39ece0aabd0e709adfc15f93ce2
SHA156398bc80ff7235fd429b0ba557e0681fbdab7a6
SHA25630b816a90abbe520bcb6606d022f3c870a72ad05a94522ff64b8395bfc088e67
SHA51236fabd7f88f8895f2561d5983a6243781ddefea711d9905a0870daa24f95928ea4af72258e7c842f9c4df9dd2553ef9b67a4f5cdc1f3a75e54cd38070465c66c
-
Filesize
528KB
MD5b7c9f1e7e640f1a034be84af86970d45
SHA1f795dc3d781b9578a96c92658b9f95806fc9bdde
SHA2566d0a06b90213f082cb98950890518c0f08b9fc16dbfab34d400267cb6cdadeff
SHA512da63992b68f1112c0d6b33e6004f38e85b3c3e251e0d5457cd63804a49c5aa05aa23249e0614dacad4fec28ca6efdb5ddee06da5bfbfa07e21942976201079f3