Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 14:02

General

  • Target

    vpn_ico.exe

  • Size

    1.7MB

  • MD5

    bdb4c5b8c4c698e57631a3fa67609c7b

  • SHA1

    30152fadedf4f7dbbe9ffe59c9e45724a1bd790b

  • SHA256

    f50692b2d081d70f7f61acc5a412da98a76d62a2833630c0d9ce780c65369305

  • SHA512

    aac48cedfed3c22359eb0276912348879ad0d9552ff20ea03e87119f2c4bf79c232c3a6c519ff7c1ab82e8786a1ac2f1ff423fbf1a75018e8a216d6b60460d8e

  • SSDEEP

    24576:ZQuOSRRD6IHLmw6vZIjfX4T9S0PqJFdvCfQ+vPEjLolvvKLGxj:ZQAvHLX6SMT9xPqdCfQ+vsIlqK

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vpn_ico.exe
    "C:\Users\Admin\AppData\Local\Temp\vpn_ico.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rlmcxvter.vbs"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rlmcxvter.vbs

    Filesize

    133B

    MD5

    e84cf2f01c51a193055984e7cafc690a

    SHA1

    803a27829e2835ccc091ecd0c04bb6f320ede76c

    SHA256

    7a29f21f67eceb6f30285d039c56fccb5cd49e6d84e419e3441894fadec939f2

    SHA512

    45d91ea88d9cabd5a2217bde78cf57f2743ff1877c3c3b9bb15d8f4097dab3b274e772b341b9446907243fdf2cbce1ccf3ebc9046d633cdd7e381beff631c6dd

  • memory/1796-0-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-1-0x0000000077620000-0x0000000077622000-memory.dmp

    Filesize

    8KB

  • memory/1796-2-0x0000000000991000-0x00000000009A3000-memory.dmp

    Filesize

    72KB

  • memory/1796-3-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-4-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-9-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-10-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-11-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-12-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB

  • memory/1796-16-0x0000000000990000-0x0000000000E01000-memory.dmp

    Filesize

    4.4MB