Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/08/2024, 10:00

General

  • Target

    vegas200_Loader.exe

  • Size

    71KB

  • MD5

    26256346a2282a9caa3db1d6d5592019

  • SHA1

    bb371507d2cd7d3d3dc679e61305477269126d35

  • SHA256

    c9692386e5200f64d395735dd673bc0f0a00b17ef6c81d71e094284e57ec715b

  • SHA512

    57807ab57bf41fb0425055336857a9eba4454a7f827ae3e6e3aeb97b9b7bf040c90dfc8f30a7ed99bed012dfdae93e97cccbc991756e37e6cee315dc3bf9f5db

  • SSDEEP

    1536:jP7Y+lrh0Ybac17581RvK3PVzu2Kp/9jLSp6j88XbuiDelNWHziMG0+:z7Y+lZayinKVxKp/5xXblDuEhG0+

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vegas200_Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\vegas200_Loader.exe"
    1⤵
      PID:2956
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4232
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /0
        1⤵
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1108
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1720

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1108-5-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-3-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-4-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-15-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-14-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-13-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-12-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-11-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-10-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/1108-9-0x00000272CBA90000-0x00000272CBA91000-memory.dmp

              Filesize

              4KB

            • memory/2956-0-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2956-2-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB