Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/08/2024, 10:00
Behavioral task
behavioral1
Sample
vegas200_Loader.exe
Resource
win10-20240404-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
vegas200_Loader.exe
Resource
win11-20240802-en
9 signatures
150 seconds
General
-
Target
vegas200_Loader.exe
-
Size
71KB
-
MD5
26256346a2282a9caa3db1d6d5592019
-
SHA1
bb371507d2cd7d3d3dc679e61305477269126d35
-
SHA256
c9692386e5200f64d395735dd673bc0f0a00b17ef6c81d71e094284e57ec715b
-
SHA512
57807ab57bf41fb0425055336857a9eba4454a7f827ae3e6e3aeb97b9b7bf040c90dfc8f30a7ed99bed012dfdae93e97cccbc991756e37e6cee315dc3bf9f5db
-
SSDEEP
1536:jP7Y+lrh0Ybac17581RvK3PVzu2Kp/9jLSp6j88XbuiDelNWHziMG0+:z7Y+lZayinKVxKp/5xXblDuEhG0+
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2956-0-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2956-2-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1108 taskmgr.exe Token: SeSystemProfilePrivilege 1108 taskmgr.exe Token: SeCreateGlobalPrivilege 1108 taskmgr.exe Token: 33 1108 taskmgr.exe Token: SeIncBasePriorityPrivilege 1108 taskmgr.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe -
Suspicious use of SendNotifyMessage 51 IoCs
pid Process 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe 1108 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vegas200_Loader.exe"C:\Users\Admin\AppData\Local\Temp\vegas200_Loader.exe"1⤵PID:2956
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4232
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1108
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1720