Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
VPN Connection Indicator Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VPN Connection Indicator Setup.exe
Resource
win10v2004-20240802-en
General
-
Target
VPN Connection Indicator Setup.exe
-
Size
867KB
-
MD5
5b9b313e1cac20d4f1a171fd5b2a6ecc
-
SHA1
72365ea10b786785d0f609f6f44910f076c61507
-
SHA256
43e7008b74ec016f4fff6c4aa1a8283c211161e7434cb8189f8f1a92e6220b3d
-
SHA512
127f4dabade36137c415fd36fef01d203deb963c5b85bd22b25e031f598dd24ab44414abd4f837378167c1a3b100644aa3a736e3c69aaaace174ad29f7c598f2
-
SSDEEP
24576:ZQiJmOl5MBZkGMe6zp6WYtvZ0Tjh9jY+6wYX6P3R3NLv21:Z9J/SkG76lTYpZIhlXZPLw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 VPN Connection Indicator Setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 2436 VPN Connection Indicator Setup.exe 2316 VPN Connection Indicator Setup.tmp 2316 VPN Connection Indicator Setup.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPN Connection Indicator Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPN Connection Indicator Setup.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 VPN Connection Indicator Setup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30 PID 2436 wrote to memory of 2316 2436 VPN Connection Indicator Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\VPN Connection Indicator Setup.exe"C:\Users\Admin\AppData\Local\Temp\VPN Connection Indicator Setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\is-MBVQG.tmp\VPN Connection Indicator Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MBVQG.tmp\VPN Connection Indicator Setup.tmp" /SL5="$400EC,487811,300544,C:\Users\Admin\AppData\Local\Temp\VPN Connection Indicator Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
928KB
MD50ad85eda6edacf925d6aed8543fcd30b
SHA178c08b2a7f0d6f1384915be7fdec54d8f38be885
SHA25699c2e1f45b79f1967309b65099606b214fa8bdbdada9de5a1e04c8893d227ea8
SHA5125e35c050f03986dbe38c17aa9ba063b55c2e8ff337fd099b3b591f234aa4aaf2ab7b734d9cc2451e32fbf6e517afb209b396f6bd489a2ab65aa45b7316104cc7