Analysis
-
max time kernel
32s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 05:48
Behavioral task
behavioral1
Sample
VЕGАS Prо.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
VЕGАS Prо.exe
Resource
win11-20240426-en
General
-
Target
VЕGАS Prо.exe
-
Size
101.7MB
-
MD5
cd5df5f6e86bdd5408d11b6204053c21
-
SHA1
ea20629b9db077aa6bfe46e16bd22bfdc580d380
-
SHA256
56f44707456eb8cfd4d7ab6c63c62015515a4a6154ff5e92e92e576b133003d1
-
SHA512
bf57afe5f6aa6a4affb3bb0a805399eda06d07e170a1d09804cf9b190f53a81d14bea07e421d0991c514e22af3a55077d3d8bf2eb5b7f12b7ad2725c9778448c
-
SSDEEP
1572864:GRWWlH8DHsD6tzKii6a3/1pY1rSVhFIYUT/zdylJMos/hhQ147FyixHX0w:GwHO53DTFIYUTZyl5ohQrMj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VЕGАS Prо.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation VЕGАS Prо.exe -
Executes dropped EXE 1 IoCs
Processes:
VЕGАSPrо.EXEpid process 2064 VЕGАSPrо.EXE -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/3580-1-0x0000000000690000-0x0000000001690000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
VЕGАS Prо.exedescription pid process Token: SeDebugPrivilege 3580 VЕGАS Prо.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
VЕGАS Prо.exedescription pid process target process PID 3580 wrote to memory of 2064 3580 VЕGАS Prо.exe VЕGАSPrо.EXE PID 3580 wrote to memory of 2064 3580 VЕGАS Prо.exe VЕGАSPrо.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\VЕGАS Prо.exe"C:\Users\Admin\AppData\Local\Temp\VЕGАS Prо.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Temp\VЕGАSPrо.EXE"C:\Windows\Temp\VЕGАSPrо.EXE"2⤵
- Executes dropped EXE
PID:2064