Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 14:02

General

  • Target

    vpn_ico.exe

  • Size

    1.7MB

  • MD5

    bdb4c5b8c4c698e57631a3fa67609c7b

  • SHA1

    30152fadedf4f7dbbe9ffe59c9e45724a1bd790b

  • SHA256

    f50692b2d081d70f7f61acc5a412da98a76d62a2833630c0d9ce780c65369305

  • SHA512

    aac48cedfed3c22359eb0276912348879ad0d9552ff20ea03e87119f2c4bf79c232c3a6c519ff7c1ab82e8786a1ac2f1ff423fbf1a75018e8a216d6b60460d8e

  • SSDEEP

    24576:ZQuOSRRD6IHLmw6vZIjfX4T9S0PqJFdvCfQ+vPEjLolvvKLGxj:ZQAvHLX6SMT9xPqdCfQ+vsIlqK

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vpn_ico.exe
    "C:\Users\Admin\AppData\Local\Temp\vpn_ico.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\giujkcjckfky.vbs"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:4768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\giujkcjckfky.vbs

    Filesize

    145B

    MD5

    64def7f7b8972df32c7f7da76c5be746

    SHA1

    b01bf36791c864882d84f00ac41b4b12c8163bac

    SHA256

    81f46e3a4cfa624b18b42cfbfa2dd0f5b0e26943710cbcc3e8e1f99ee7337f73

    SHA512

    ba57503e7fdb214635e540536ba2ed6cf8d1242469f7cd6c4750eeb17291b1ba06a4413aa96df0555584c49f150e5be1f1e84dbcac284b151edb977bd59e9d64

  • memory/4556-0-0x0000000001000000-0x0000000001471000-memory.dmp

    Filesize

    4.4MB

  • memory/4556-1-0x0000000077CD4000-0x0000000077CD6000-memory.dmp

    Filesize

    8KB

  • memory/4556-2-0x0000000001001000-0x0000000001013000-memory.dmp

    Filesize

    72KB

  • memory/4556-3-0x0000000001000000-0x0000000001471000-memory.dmp

    Filesize

    4.4MB

  • memory/4556-8-0x0000000001000000-0x0000000001471000-memory.dmp

    Filesize

    4.4MB

  • memory/4556-9-0x0000000001000000-0x0000000001471000-memory.dmp

    Filesize

    4.4MB

  • memory/4556-14-0x0000000001000000-0x0000000001471000-memory.dmp

    Filesize

    4.4MB