Overview
overview
10Static
static
3ProtonVPN-...er.dll
windows11-21h2-x64
1ProtonVPN-...er.exe
windows11-21h2-x64
10ProtonVPN-...OV.ps1
windows11-21h2-x64
3ProtonVPN-...er.dll
windows11-21h2-x64
1ProtonVPN-...er.exe
windows11-21h2-x64
8ProtonVPN-...AR.exe
windows11-21h2-x64
4ProtonVPN-...er.dll
windows11-21h2-x64
1ProtonVPN-...er.exe
windows11-21h2-x64
8ProtonVPN-...et.exe
windows11-21h2-x64
3Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-fr -
resource tags
arch:x64arch:x86image:win11-20240802-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
07-08-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
ProtonVPN-10_11/Launcher.dll
Resource
win11-20240802-fr
Behavioral task
behavioral2
Sample
ProtonVPN-10_11/Launcher.exe
Resource
win11-20240802-fr
Behavioral task
behavioral3
Sample
ProtonVPN-10_11/data/appInfo/nRCRxIB7aYOV.ps1
Resource
win11-20240802-fr
Behavioral task
behavioral4
Sample
ProtonVPN-10_11/data/appInfo/services/Launhcer.dll
Resource
win11-20240802-fr
Behavioral task
behavioral5
Sample
ProtonVPN-10_11/data/appInfo/services/Launhcer.exe
Resource
win11-20240802-fr
Behavioral task
behavioral6
Sample
ProtonVPN-10_11/data/appInfo/services/WinRAR.exe
Resource
win11-20240802-fr
Behavioral task
behavioral7
Sample
ProtonVPN-10_11/data/appInfo/services/data/Launcher.dll
Resource
win11-20240802-fr
Behavioral task
behavioral8
Sample
ProtonVPN-10_11/data/appInfo/services/data/Launcher.exe
Resource
win11-20240802-fr
Behavioral task
behavioral9
Sample
ProtonVPN-10_11/data/appInfo/services/wget.exe
Resource
win11-20240802-fr
General
-
Target
ProtonVPN-10_11/data/appInfo/services/data/Launcher.exe
-
Size
364KB
-
MD5
93fde4e38a84c83af842f73b176ab8dc
-
SHA1
e8c55cc160a0a94e404f544b22e38511b9d71da8
-
SHA256
fb07af2aead3bdf360f555fc872191e43c2f0acbfc9258435f9a30afe272ba03
-
SHA512
48720aebe2158b8a58fc3431c2e6f68271fbade51303ad9cb5b0493efaec6053ff0c19a898841ef7c57a3c4d042ac8e7157fb3dc79593c1dfcdcf88e1469fdec
-
SSDEEP
6144:MpS9kEFKbITUvR8cy8dzQ7Lcf3Si96sfO+2RZrTql9unNrkYqliwrqH1JWP6f:Mp8KLBzQ7Lcf3SiQs2FTTql9unNrkvT2
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Launcher.exepowershell.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 4312 powershell.exe 4312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 4312 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Launcher.exedescription pid Process procid_target PID 5064 wrote to memory of 4312 5064 Launcher.exe 77 PID 5064 wrote to memory of 4312 5064 Launcher.exe 77 PID 5064 wrote to memory of 4312 5064 Launcher.exe 77 PID 5064 wrote to memory of 1228 5064 Launcher.exe 79 PID 5064 wrote to memory of 1228 5064 Launcher.exe 79 PID 5064 wrote to memory of 1228 5064 Launcher.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\ProtonVPN-10_11\data\appInfo\services\data\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\ProtonVPN-10_11\data\appInfo\services\data\Launcher.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath $env:ProgramData, $env:AppData, $env:SystemDrive\ "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K rd /s /q "C:\Users\Admin\AppData\Roaming\services" & EXIT2⤵
- System Location Discovery: System Language Discovery
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82