Analysis Overview
SHA256
ede84803bface8bb45d2f293d8766f6099dab30b1f2d74207398835ff255e385
Threat Level: Known bad
The file e3fe0be8cd50ca837069bc2564ab0532.exe was found to be: Known bad.
Malicious Activity Summary
SystemBC
Blocklisted process makes network request
VMProtect packed file
Unsigned PE
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-08-09 09:11
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-09 09:11
Reported
2023-08-09 09:13
Platform
win10v2004-20230703-en
Max time kernel
141s
Max time network
118s
Command Line
Signatures
SystemBC
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| RU | 5.42.65.67:4298 | tcp | |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.210.247.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
memory/2100-133-0x00007FFA9EFB0000-0x00007FFA9EFB2000-memory.dmp
memory/2100-135-0x00007FFA815A0000-0x00007FFA81F6A000-memory.dmp
memory/2100-134-0x00007FFA9EFC0000-0x00007FFA9EFC2000-memory.dmp
memory/2100-136-0x00007FFA9DC70000-0x00007FFA9DC72000-memory.dmp
memory/2100-137-0x00007FFA9DCF0000-0x00007FFA9DCF2000-memory.dmp
memory/2100-138-0x00007FFA9C800000-0x00007FFA9C802000-memory.dmp
memory/2100-139-0x00007FFA9C810000-0x00007FFA9C812000-memory.dmp
memory/2100-140-0x00007FFA9EFD0000-0x00007FFA9EFD2000-memory.dmp
memory/2100-142-0x00007FFA815A0000-0x00007FFA81F6A000-memory.dmp
memory/2100-143-0x0000022360410000-0x0000022360525000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-09 09:11
Reported
2023-08-09 09:13
Platform
win7-20230712-en
Max time kernel
118s
Max time network
122s
Command Line
Signatures
SystemBC
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1
Network
| Country | Destination | Domain | Proto |
| RU | 5.42.65.67:4298 | tcp |
Files
memory/1964-54-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/1964-56-0x000007FEF4D70000-0x000007FEF573A000-memory.dmp
memory/1964-57-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/1964-59-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/1964-60-0x0000000077600000-0x0000000077602000-memory.dmp
memory/1964-62-0x0000000077600000-0x0000000077602000-memory.dmp
memory/1964-64-0x0000000077600000-0x0000000077602000-memory.dmp
memory/1964-65-0x0000000077610000-0x0000000077612000-memory.dmp
memory/1964-69-0x0000000077610000-0x0000000077612000-memory.dmp
memory/1964-67-0x0000000077610000-0x0000000077612000-memory.dmp
memory/1964-70-0x0000000077620000-0x0000000077622000-memory.dmp
memory/1964-72-0x0000000077620000-0x0000000077622000-memory.dmp
memory/1964-74-0x0000000077620000-0x0000000077622000-memory.dmp
memory/1964-77-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp
memory/1964-79-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp
memory/1964-82-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp
memory/1964-84-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp
memory/1964-85-0x0000000077630000-0x0000000077632000-memory.dmp
memory/1964-87-0x0000000077630000-0x0000000077632000-memory.dmp
memory/1964-89-0x0000000077630000-0x0000000077632000-memory.dmp
memory/1964-90-0x0000000077440000-0x00000000775E9000-memory.dmp
memory/1964-91-0x000007FEF4D70000-0x000007FEF573A000-memory.dmp
memory/1964-92-0x0000000077440000-0x00000000775E9000-memory.dmp