Resubmissions

03-07-2024 02:51

240703-dcfrmatepc 10

03-07-2024 02:39

240703-c5h7satbkh 8

19-06-2024 01:29

240619-bv78gswajp 10

19-06-2024 01:23

240619-brv4ravhkp 7

Analysis

  • max time kernel
    133s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 02:51

General

  • Target

    Vorion App Setup.exe

  • Size

    47.3MB

  • MD5

    019deea60b1ed114c79d7e99d6f34c62

  • SHA1

    71e928e93900ab62d379104fd0c847f35e6f87ce

  • SHA256

    48320cb8fd5ed9a3ccbaf9fc03bd160c3694c79d0efc8a8cf899069fc1d8e677

  • SHA512

    8c0ad3b65fe10f9fd16ef54e432b2dbca31343d62820f9ec63028a810bb2088397c2c7db4c2689ca39eceb75f3736379ed31d5d0acdd6784def3ca538a93b3c2

  • SSDEEP

    786432:OeMGFdbCRVH/wb1eGgw6lxr7gyvFRN3GQ5PesBc8t9u4lVqwODANujJ7j8:OQdS/wgGg5nr7gy8sBc8Luu8Akj8

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Vorion App Setup.exe"
    1⤵
    • Loads dropped DLL
    PID:348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw639E.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    d095b082b7c5ba4665d40d9c5042af6d

    SHA1

    2220277304af105ca6c56219f56f04e894b28d27

    SHA256

    b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

    SHA512

    61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

  • C:\Users\Admin\AppData\Local\Temp\nsw639E.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    50016010fb0d8db2bc4cd258ceb43be5

    SHA1

    44ba95ee12e69da72478cf358c93533a9c7a01dc

    SHA256

    32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

    SHA512

    ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

  • C:\Users\Admin\AppData\Local\Temp\nsw639E.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    1539fc6e1646d7c7db8c019f7630581c

    SHA1

    47daa1754d330343ab3cbeb88ae17fe0f6a126a3

    SHA256

    95655a18153c2c5ccbe82bdbbefa511f4d6cea84bffae92e3a2b478787f2298c

    SHA512

    4cf8209ec381fbb1b5013ad872a6b33fb95e78c886472c3f87290b05f297f5f873a9bdd35cd7f2af6be20b4cb91b51a2ea40c1efd4fabb40f96625be1ed5e9f6