Resubmissions

03-07-2024 02:51

240703-dcfrmatepc 10

03-07-2024 02:39

240703-c5h7satbkh 8

19-06-2024 01:29

240619-bv78gswajp 10

19-06-2024 01:23

240619-brv4ravhkp 7

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2024 01:23

General

  • Target

    Vorion App Setup.exe

  • Size

    47.3MB

  • MD5

    019deea60b1ed114c79d7e99d6f34c62

  • SHA1

    71e928e93900ab62d379104fd0c847f35e6f87ce

  • SHA256

    48320cb8fd5ed9a3ccbaf9fc03bd160c3694c79d0efc8a8cf899069fc1d8e677

  • SHA512

    8c0ad3b65fe10f9fd16ef54e432b2dbca31343d62820f9ec63028a810bb2088397c2c7db4c2689ca39eceb75f3736379ed31d5d0acdd6784def3ca538a93b3c2

  • SSDEEP

    786432:OeMGFdbCRVH/wb1eGgw6lxr7gyvFRN3GQ5PesBc8t9u4lVqwODANujJ7j8:OQdS/wgGg5nr7gy8sBc8Luu8Akj8

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy1EE8.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    ef9e4eddcf45ffaed468b0dc6837e131

    SHA1

    84d52daca16c100b7ebce3773523aa89e461673c

    SHA256

    c2d9b4bb8f5dad13cb966e9aba069a35d05326898b90d9ac517d4c5278e513f4

    SHA512

    d3fd4e7480be9c28ef4f16e1c1c0782bfe95abf5ca6469ae128a5304755a0c7851ddb1e543bc3e275217785c9434c0d722564719cd1934e2ce356565c3fa3828

  • \Users\Admin\AppData\Local\Temp\nsy1EE8.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    d095b082b7c5ba4665d40d9c5042af6d

    SHA1

    2220277304af105ca6c56219f56f04e894b28d27

    SHA256

    b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

    SHA512

    61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

  • \Users\Admin\AppData\Local\Temp\nsy1EE8.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    50016010fb0d8db2bc4cd258ceb43be5

    SHA1

    44ba95ee12e69da72478cf358c93533a9c7a01dc

    SHA256

    32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

    SHA512

    ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233