Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
Vodka.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Vodka.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
Vodka.exe
-
Size
454KB
-
MD5
6ff1a159ea827fc4cc63417004a81030
-
SHA1
e6412f570c1c3aa91e8e87a92a8a848547f9b94d
-
SHA256
f7962bec2e9ae0913ca8c8b3349a306d5e6f200ec6c1531e35749bb00d1b6a10
-
SHA512
0039a328696c002a533da4f51ece25b61e7bb4256bb2af5dff02fa338f9a18e0a69da5ea3618d2f4c746960aa2df3188a5c0c1b115568e81a1436fc6b85b9116
-
SSDEEP
12288:eTLpZM7P6UknZxn/7kRizAMzd6V7+aqEsapYNd1:eT7M7P6FZQQRxC7+JEfpWd1
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2084 Vodka.exe 2084 Vodka.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Forportens179.ini Vodka.exe File created C:\Program Files (x86)\nellike\dermatophagus.lnk Vodka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1976 2084 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vodka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1976 2084 Vodka.exe 31 PID 2084 wrote to memory of 1976 2084 Vodka.exe 31 PID 2084 wrote to memory of 1976 2084 Vodka.exe 31 PID 2084 wrote to memory of 1976 2084 Vodka.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vodka.exe"C:\Users\Admin\AppData\Local\Temp\Vodka.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 5242⤵
- Program crash
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472