Resubmissions

03-07-2024 02:51

240703-dcfrmatepc 10

03-07-2024 02:39

240703-c5h7satbkh 8

19-06-2024 01:29

240619-bv78gswajp 10

19-06-2024 01:23

240619-brv4ravhkp 7

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 01:29

General

  • Target

    Vorion App Setup.exe

  • Size

    47.3MB

  • MD5

    019deea60b1ed114c79d7e99d6f34c62

  • SHA1

    71e928e93900ab62d379104fd0c847f35e6f87ce

  • SHA256

    48320cb8fd5ed9a3ccbaf9fc03bd160c3694c79d0efc8a8cf899069fc1d8e677

  • SHA512

    8c0ad3b65fe10f9fd16ef54e432b2dbca31343d62820f9ec63028a810bb2088397c2c7db4c2689ca39eceb75f3736379ed31d5d0acdd6784def3ca538a93b3c2

  • SSDEEP

    786432:OeMGFdbCRVH/wb1eGgw6lxr7gyvFRN3GQ5PesBc8t9u4lVqwODANujJ7j8:OQdS/wgGg5nr7gy8sBc8Luu8Akj8

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe"
    1⤵
    • Loads dropped DLL
    PID:312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsr57B7.tmp\InstallOptions.dll
    Filesize

    15KB

    MD5

    d095b082b7c5ba4665d40d9c5042af6d

    SHA1

    2220277304af105ca6c56219f56f04e894b28d27

    SHA256

    b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

    SHA512

    61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

  • C:\Users\Admin\AppData\Local\Temp\nsr57B7.tmp\LangDLL.dll
    Filesize

    5KB

    MD5

    50016010fb0d8db2bc4cd258ceb43be5

    SHA1

    44ba95ee12e69da72478cf358c93533a9c7a01dc

    SHA256

    32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

    SHA512

    ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

  • C:\Users\Admin\AppData\Local\Temp\nsr57B7.tmp\ioSpecial.ini
    Filesize

    1KB

    MD5

    666191646a719bbf24cf49dadcd2b3cc

    SHA1

    e2cc8b63f332dd5def858d12d53c68beacf795a6

    SHA256

    a86011834da59d3a0dacebc87d8a3f142d0624165fada8c7d7edea15ca365aef

    SHA512

    837f5c1c5179ba0834db8bcb80cdc37b87448f3d7331dddd2c89bc018ba38d8e05152de03db3e1397acee3ee1a68f9ff23b4daee11839581f261c06b645b2d4f