Resubmissions

28/03/2025, 09:45

250328-lq2j9at1bz 8

28/03/2025, 09:41

250328-lnyetawnt5 3

Analysis

  • max time kernel
    131s
  • max time network
    106s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    28/03/2025, 09:41

General

  • Target

    avira_phantom_vpn_2.44.1.19908.zip

  • Size

    6.2MB

  • MD5

    b9b2f585fb621dcf7e0858987eaa774d

  • SHA1

    0f5d26a3041308b7ec1659ef9891f87daedcd3a8

  • SHA256

    811f17cb1e3e1bf202c254d755f3b00a3289366db84ca61ebef786f9397755e0

  • SHA512

    62df05928a67651bca557a6d161e00c34c81052549e51e422d9c0753e3548ddad981ce3e2ba638f8baff6692dc8b110012a25d81b6d218b6100bbb272413a9ea

  • SSDEEP

    98304:HQWi5GflAJd9R0uA0MUr0A8KJO4vEmVl+2jF+iq439Joj2LV7QyKIz:HQWikWk0MG04DJjVtJoqGytz

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\avira_phantom_vpn_2.44.1.19908.zip
    1⤵
      PID:2060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\explorer.exe
          explorer
          3⤵
          • Modifies registry class
          PID:836
        • C:\Windows\explorer.exe
          explorer.exe
          3⤵
          • Modifies registry class
          PID:5664
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5236
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\windows-delete-winpe.bat" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3544
        • C:\Windows\system32\diskpart.exe
          diskpart /s C:\diskpart.txt
          2⤵
            PID:636
        • C:\Windows\System32\vdsldr.exe
          C:\Windows\System32\vdsldr.exe -Embedding
          1⤵
            PID:5544
          • C:\Windows\System32\vds.exe
            C:\Windows\System32\vds.exe
            1⤵
            • Checks SCSI registry key(s)
            PID:1352
          • C:\Windows\System32\fontview.exe
            "C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\ShowPublish.otf
            1⤵
              PID:6052

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin

              Filesize

              414KB

              MD5

              ab79489e9704fc9cc9d8bee4f8e17ec5

              SHA1

              b2e19a89b43d537bb5b02ee9ca2418f027259c1e

              SHA256

              4d71760d6f3159849068b635ab4c39b9b747d899f03670533971a62d262c264e

              SHA512

              60d11ee023b9a045c4b59b88311f001fcf4856e27837a1ffd6ecab0203e5199ee077d85c5217e0f0b94e0bff93b14c3680816b6fbf9d42ee2eff5c23d9a13edd

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cmo1lgoe.u4w.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\diskpart.txt

              Filesize

              34B

              MD5

              4ce2f5d2d139f0ba31af18aea764a509

              SHA1

              36a86ceb2fd6e7245f64b9dea0504bdae5f29e85

              SHA256

              ad79a52bd3b67b0453c32d332a22cc65222c5a33a8450babf2fbbbc65bd097d5

              SHA512

              a418c02372091fb2d13a36e912b10c4ba97c37c160edc3fbcacf6004d55a424c8a323c223cae7d6acd06b29385ffdd80a04fe2833f4e22eb2993314123a0f45a

            • memory/5028-16-0x00007FFBDD370000-0x00007FFBDDE32000-memory.dmp

              Filesize

              10.8MB

            • memory/5028-14-0x00007FFBDD370000-0x00007FFBDDE32000-memory.dmp

              Filesize

              10.8MB

            • memory/5028-15-0x00000227F3E40000-0x00000227F3E84000-memory.dmp

              Filesize

              272KB

            • memory/5028-2-0x00007FFBDD373000-0x00007FFBDD375000-memory.dmp

              Filesize

              8KB

            • memory/5028-17-0x00000227F3F10000-0x00000227F3F86000-memory.dmp

              Filesize

              472KB

            • memory/5028-19-0x00007FFBDD373000-0x00007FFBDD375000-memory.dmp

              Filesize

              8KB

            • memory/5028-20-0x00007FFBDD370000-0x00007FFBDDE32000-memory.dmp

              Filesize

              10.8MB

            • memory/5028-13-0x00007FFBDD370000-0x00007FFBDDE32000-memory.dmp

              Filesize

              10.8MB

            • memory/5028-3-0x00000227F2E70000-0x00000227F2E92000-memory.dmp

              Filesize

              136KB

            • memory/5028-31-0x00007FFBDD370000-0x00007FFBDDE32000-memory.dmp

              Filesize

              10.8MB