Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
VixenExternal/VixenLoader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VixenExternal/VixenLoader.exe
Resource
win10v2004-20241007-en
General
-
Target
VixenExternal/VixenLoader.exe
-
Size
44.0MB
-
MD5
07c2ff366c0b16862e6ca03dfcc94428
-
SHA1
9c29ee175d18edb1478e6074cbf123fe655684f0
-
SHA256
6d8b2f6d80ee783788c63d2428e1707a99cacd8cc2e3daf8c8d3c394b6f6f8bd
-
SHA512
40bec9b10392836be19a167e2140f4044a9a72f76345c7b84472446814738d261173f2ed12387dcace104068309416a22b7390330331337365188cb9c5a3cbe5
-
SSDEEP
786432:Jo1IpD9h6HHveoo3Zl/xvj44b2Lr1rcSr+oy3Mao+8vUQDcpLlylA:Jo1EhQHHveoSZRxp2Lrj+oyjocQw
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 592 CatPublicFr.exe 2972 Vixen Free.exe 2988 Stub.exe -
Loads dropped DLL 4 IoCs
pid Process 2368 VixenLoader.exe 2284 Process not Found 2972 Vixen Free.exe 2988 Stub.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CompPkgSup.dll CatPublicFr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN CatPublicFr.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Vixen Free.exe VixenLoader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VixenLoader.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739 CatPublicFr.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\DefaultIcon CatPublicFr.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\shell\open CatPublicFr.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\shell CatPublicFr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VixenExternal\\CatPublicFr.exe" CatPublicFr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\ = "URL:Run game 345229890980937739 protocol" CatPublicFr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\URL Protocol CatPublicFr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VixenExternal\\CatPublicFr.exe" CatPublicFr.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\discord-345229890980937739\shell\open\command CatPublicFr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe 592 CatPublicFr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2368 wrote to memory of 592 2368 VixenLoader.exe 30 PID 2368 wrote to memory of 592 2368 VixenLoader.exe 30 PID 2368 wrote to memory of 592 2368 VixenLoader.exe 30 PID 2368 wrote to memory of 592 2368 VixenLoader.exe 30 PID 2368 wrote to memory of 2972 2368 VixenLoader.exe 32 PID 2368 wrote to memory of 2972 2368 VixenLoader.exe 32 PID 2368 wrote to memory of 2972 2368 VixenLoader.exe 32 PID 2368 wrote to memory of 2972 2368 VixenLoader.exe 32 PID 592 wrote to memory of 3004 592 CatPublicFr.exe 33 PID 592 wrote to memory of 3004 592 CatPublicFr.exe 33 PID 592 wrote to memory of 3004 592 CatPublicFr.exe 33 PID 2972 wrote to memory of 2988 2972 Vixen Free.exe 34 PID 2972 wrote to memory of 2988 2972 Vixen Free.exe 34 PID 2972 wrote to memory of 2988 2972 Vixen Free.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\VixenExternal\VixenLoader.exe"C:\Users\Admin\AppData\Local\Temp\VixenExternal\VixenLoader.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\VixenExternal\CatPublicFr.exe"C:\Users\Admin\AppData\Local\Temp\VixenExternal\CatPublicFr.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3004
-
-
-
C:\Windows\Vixen Free.exe"C:\Windows\Vixen Free.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\onefile_2972_133778440894412000\Stub.exe"C:\Windows\Vixen Free.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
38.2MB
MD5435ec84a9fa0cd8a5d979f139d529edd
SHA12cd983ba573163cd7cf34ff7e989e4773a1f1465
SHA2566ce7962f45d3739810870c363f2bfab0e9cbfe448e5b5f1e6cfab829df610eb5
SHA5125e138c594b1ac0be97ed772a2007765f5b887a71f4d2a009d5ac37f6074e78fe92a38a1d8abad560e7abfa4b78f7352e18647ec90ca8df4c014e550c1b1fe059
-
Filesize
5.8MB
MD5c3f1aa504cbc00e806fd878b4de40af1
SHA1742600d2a375a730d1beb49b76240ae8998c4700
SHA256bec581f8ae692c99513da0442dc92f8e8c29bbd15f8be6938e2a9d48a0a87d17
SHA512452a934380ebe9ee0b456e04a3f0aec87e52a3d07ad30e65aa2e36fed331d166803e281f8e6c1bed8232cbbeec63d20bcfa04be918f994674b8fecbedf2e8239