Overview
overview
10Static
static
10241105-dtx...ed.zip
windows11-21h2-x64
10di3x.exe
windows11-21h2-x64
102019-09-02...10.exe
windows11-21h2-x64
102c01b00772...eb.exe
windows11-21h2-x64
1031.exe
windows11-21h2-x64
103DMark 11 ...on.exe
windows11-21h2-x64
342f9729255...61.exe
windows11-21h2-x64
105da0116af4...18.exe
windows11-21h2-x64
569c56d12ed...6b.exe
windows11-21h2-x64
10905d572f23...50.exe
windows11-21h2-x64
10948340be97...54.exe
windows11-21h2-x64
1095560f1a46...f9.dll
windows11-21h2-x64
3Archive.zi...3e.exe
windows11-21h2-x64
7DiskIntern...en.exe
windows11-21h2-x64
3ForceOp 2....ce.exe
windows11-21h2-x64
7HYDRA.exe
windows11-21h2-x64
10KLwC6vii.exe
windows11-21h2-x64
1Keygen.exe
windows11-21h2-x64
10Lonelyscre...ox.exe
windows11-21h2-x64
3LtHv0O2KZDK4M637.exe
windows11-21h2-x64
10Magic_File...ja.exe
windows11-21h2-x64
3OnlineInstaller.exe
windows11-21h2-x64
8Remouse.Mi...cg.exe
windows11-21h2-x64
3SecuriteIn...dE.exe
windows11-21h2-x64
10SecuriteIn...ee.dll
windows11-21h2-x64
10SecurityTa...up.exe
windows11-21h2-x64
4Treasure.V...ox.exe
windows11-21h2-x64
3VyprVPN.exe
windows11-21h2-x64
10WSHSetup[1].exe
windows11-21h2-x64
3Yard.dll
windows11-21h2-x64
10b2bd3de3e5...2).exe
windows11-21h2-x64
10Resubmissions
01/04/2025, 21:24
250401-z8184awycs 10Analysis
-
max time kernel
90s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/02/2025, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win11-20250218-en
Behavioral task
behavioral2
Sample
0di3x.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
2019-09-02_22-41-10.exe
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
31.exe
Resource
win11-20250218-en
Behavioral task
behavioral6
Sample
3DMark 11 Advanced Edition.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
42f972925508a82236e8533567487761.exe
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.dll
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
Archive.zip__ccacaxs2tbz2t6ob3e.exe
Resource
win11-20250217-en
Behavioral task
behavioral14
Sample
DiskInternals_Uneraser_v5_keygen.exe
Resource
win11-20250218-en
Behavioral task
behavioral15
Sample
ForceOp 2.8.7 - By RaiSence.exe
Resource
win11-20250217-en
Behavioral task
behavioral16
Sample
HYDRA.exe
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
KLwC6vii.exe
Resource
win11-20250217-en
Behavioral task
behavioral18
Sample
Keygen.exe
Resource
win11-20250217-en
Behavioral task
behavioral19
Sample
Lonelyscreen.1.2.9.keygen.by.Paradox.exe
Resource
win11-20250217-en
Behavioral task
behavioral20
Sample
LtHv0O2KZDK4M637.exe
Resource
win11-20250217-en
Behavioral task
behavioral21
Sample
Magic_File_v3_keygen_by_KeygenNinja.exe
Resource
win11-20250217-en
Behavioral task
behavioral22
Sample
OnlineInstaller.exe
Resource
win11-20250217-en
Behavioral task
behavioral23
Sample
Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe
Resource
win11-20250217-en
Behavioral task
behavioral25
Sample
SecuriteInfo.com.Generic.mg.cde56cf0169830ee.dll
Resource
win11-20250217-en
Behavioral task
behavioral26
Sample
SecurityTaskManager_Setup.exe
Resource
win11-20250217-en
Behavioral task
behavioral27
Sample
Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe
Resource
win11-20250217-en
Behavioral task
behavioral28
Sample
VyprVPN.exe
Resource
win11-20250217-en
Behavioral task
behavioral29
Sample
WSHSetup[1].exe
Resource
win11-20250217-en
Behavioral task
behavioral30
Sample
Yard.dll
Resource
win11-20250217-en
General
-
Target
VyprVPN.exe
-
Size
1.6MB
-
MD5
f1d5f022e71b8bc9e3241fbb72e87be2
-
SHA1
1b8abac6f9ffc3571b14c68ae1bc5e7568b4106c
-
SHA256
08fb58bfaee81d99cbb71bf71ba8f2ab4f107563c5b0c3f20484d096b337e50d
-
SHA512
f16130958a3ff33b21623881cbdeec018dd031b4aeb01bbb676c4bdeb1ec1d4f7d312efab48b4125eaaf6ea1c8b0aa4e037b1959af1f10c2a55fbc2da9f3924f
-
SSDEEP
24576:nTadGsNY1i8fWCsSpqq5M0bOk61uyG2CWm3U9X+Y0ttcN0sH2U9:nsGsm1qSp/MzRuI19X+Y0w39
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2250935964-4080446702-2776729278-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe -
Executes dropped EXE 6 IoCs
pid Process 2724 joinResult.exe 248 VyprVPN.exe 1532 1111.exe 4764 Clipper.exe 1232 WinService.exe 3340 WinService.exe -
Loads dropped DLL 2 IoCs
pid Process 888 VyprVPN.exe 2724 joinResult.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1532 1111.exe 1532 1111.exe 1532 1111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joinResult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4052 cmd.exe 5000 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral28/files/0x001900000002af5e-9.dat nsis_installer_1 behavioral28/files/0x001900000002af5e-9.dat nsis_installer_2 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5000 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 1111.exe 1532 1111.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4764 Clipper.exe Token: SeDebugPrivilege 1232 WinService.exe Token: SeDebugPrivilege 3340 WinService.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 1111.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 888 wrote to memory of 2724 888 VyprVPN.exe 83 PID 888 wrote to memory of 2724 888 VyprVPN.exe 83 PID 888 wrote to memory of 2724 888 VyprVPN.exe 83 PID 888 wrote to memory of 248 888 VyprVPN.exe 84 PID 888 wrote to memory of 248 888 VyprVPN.exe 84 PID 888 wrote to memory of 248 888 VyprVPN.exe 84 PID 2724 wrote to memory of 1532 2724 joinResult.exe 85 PID 2724 wrote to memory of 1532 2724 joinResult.exe 85 PID 2724 wrote to memory of 1532 2724 joinResult.exe 85 PID 2724 wrote to memory of 4764 2724 joinResult.exe 86 PID 2724 wrote to memory of 4764 2724 joinResult.exe 86 PID 4764 wrote to memory of 2412 4764 Clipper.exe 88 PID 4764 wrote to memory of 2412 4764 Clipper.exe 88 PID 4764 wrote to memory of 1232 4764 Clipper.exe 90 PID 4764 wrote to memory of 1232 4764 Clipper.exe 90 PID 1532 wrote to memory of 4052 1532 1111.exe 91 PID 1532 wrote to memory of 4052 1532 1111.exe 91 PID 1532 wrote to memory of 4052 1532 1111.exe 91 PID 4052 wrote to memory of 5000 4052 cmd.exe 93 PID 4052 wrote to memory of 5000 4052 cmd.exe 93 PID 4052 wrote to memory of 5000 4052 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VyprVPN.exe"C:\Users\Admin\AppData\Local\Temp\VyprVPN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\1337\1111.exe"C:\Users\Admin\AppData\Roaming\1337\1111.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 3 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\1337\1111.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 3 -w 30005⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5000
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Service" /tr "C:\Users\Admin\WinService.exe" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2412
-
-
C:\Users\Admin\WinService.exe"C:\Users\Admin\WinService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:248
-
-
C:\Users\Admin\WinService.exeC:\Users\Admin\WinService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
1.4MB
MD532373185ece79936dfd0fd41d2848a2e
SHA1591f92bcaeeea85e8bba6988ef0d1afcea35fbbd
SHA2565390fc20629a4a350dc8f0482472f9962f50364b7818b2d510beb4e520581ad4
SHA512443b8df46dd6009285500148d2c4e0654e20e24b897fb29a9eded1cb21da6c495feaa1df81043ed4818f6ea511813c926e9f645b3ec4c8ab5c2c79f0fb5859dc
-
Filesize
18KB
MD5c7e43ab36c3da3371fc915de9dc5106f
SHA1f1bb12ae485853c1a28a8306604ef3eb3939068d
SHA2564ff04b9be72efe982594832d51681c08334f4d8512c3560c646c21f88fd5e532
SHA512383a02a7a338ca66077f5d577ae7f63f95cf1b711f1338e9dd11867a62d6dc298e0fd01878adc273669f5f1e8cffb0aa4ea3efa75ffb870616a0d3fef3cb454e
-
Filesize
3.2MB
MD525e9776bb3965060ac5d9234fd25a11d
SHA15df6e261a930c0068c94542ef5180722a513e4fb
SHA2568321b2785893442efeedddc40f0979563e8e2fc1a51cc3e4ee93d6f36d4e154d
SHA5128735acb4bad98ad06b9cee96cda9a3c5026e5f584bd4efb782cf9a8a6f3ea9e39f7d280497dabbb5f6662a6a63bb9a6674c4c020bc73669517b05d0e708d0d7c
-
Filesize
1.8MB
MD579022fbafee9fe740a5230f87bd33171
SHA142bf0f7bf41009fd0009535a8b1162cbe60dce6f
SHA256640c30cfa519be11c02c4e51bf18979a93266887cc9ef19076b3d0f1f20528b6
SHA51248e0d4a18d99dce4398de73895a157e13293115b52ee5158f9ea6fc73c4d5f4133e1cebba14ff5482b8c4f7dfeebfe3b003df1caf351314f1cc16944818df4b3