Analysis
-
max time kernel
297s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 05:32
General
-
Target
Vixen Loader.exe
-
Size
202KB
-
MD5
d5adb7cd51efbccc96d7528d5e1cdac9
-
SHA1
56c3209c57c62dad0415bd8f8f4ef6a41ba2816f
-
SHA256
bf83f08a4093e5eb31f3f7334f8e33ffc69a05b548433807952157a127dbd110
-
SHA512
191537822e9847339a31861e29bf2a38c1b3dfe9fcb6d119f381cebd51f44d75e1733344fb4da8cbd893c9858472539b267711ce52217ece8897d6b4354861d6
-
SSDEEP
6144:gLV6Bta6dtJmakIM57bQv4tlS6o8OKUUBupOin:gLV6BtpmkXAU8OKlBupOin
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsvc.exe" Vixen Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Vixen Loader.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DHCP Service\dhcpsvc.exe Vixen Loader.exe File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsvc.exe Vixen Loader.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vixen Loader.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe 3148 Vixen Loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Vixen Loader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3148 Vixen Loader.exe Token: SeDebugPrivilege 3148 Vixen Loader.exe Token: 33 4588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4588 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vixen Loader.exe"C:\Users\Admin\AppData\Local\Temp\Vixen Loader.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c8 0x3441⤵
- Suspicious use of AdjustPrivilegeToken
PID:4588