Malware Analysis Report

2024-11-30 23:26

Sample ID 230809-k5m5qsab38
Target e3fe0be8cd50ca837069bc2564ab0532.exe
SHA256 ede84803bface8bb45d2f293d8766f6099dab30b1f2d74207398835ff255e385
Tags
systembc trojan vmprotect
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ede84803bface8bb45d2f293d8766f6099dab30b1f2d74207398835ff255e385

Threat Level: Known bad

The file e3fe0be8cd50ca837069bc2564ab0532.exe was found to be: Known bad.

Malicious Activity Summary

systembc trojan vmprotect

SystemBC

Blocklisted process makes network request

VMProtect packed file

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-09 09:11

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-09 09:11

Reported

2023-08-09 09:13

Platform

win10v2004-20230703-en

Max time kernel

141s

Max time network

118s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1

Signatures

SystemBC

trojan systembc

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 5.42.65.67:4298 tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 254.210.247.8.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/2100-133-0x00007FFA9EFB0000-0x00007FFA9EFB2000-memory.dmp

memory/2100-135-0x00007FFA815A0000-0x00007FFA81F6A000-memory.dmp

memory/2100-134-0x00007FFA9EFC0000-0x00007FFA9EFC2000-memory.dmp

memory/2100-136-0x00007FFA9DC70000-0x00007FFA9DC72000-memory.dmp

memory/2100-137-0x00007FFA9DCF0000-0x00007FFA9DCF2000-memory.dmp

memory/2100-138-0x00007FFA9C800000-0x00007FFA9C802000-memory.dmp

memory/2100-139-0x00007FFA9C810000-0x00007FFA9C812000-memory.dmp

memory/2100-140-0x00007FFA9EFD0000-0x00007FFA9EFD2000-memory.dmp

memory/2100-142-0x00007FFA815A0000-0x00007FFA81F6A000-memory.dmp

memory/2100-143-0x0000022360410000-0x0000022360525000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-09 09:11

Reported

2023-08-09 09:13

Platform

win7-20230712-en

Max time kernel

118s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1

Signatures

SystemBC

trojan systembc

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\e3fe0be8cd50ca837069bc2564ab0532.dll,#1

Network

Country Destination Domain Proto
RU 5.42.65.67:4298 tcp

Files

memory/1964-54-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/1964-56-0x000007FEF4D70000-0x000007FEF573A000-memory.dmp

memory/1964-57-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/1964-59-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/1964-60-0x0000000077600000-0x0000000077602000-memory.dmp

memory/1964-62-0x0000000077600000-0x0000000077602000-memory.dmp

memory/1964-64-0x0000000077600000-0x0000000077602000-memory.dmp

memory/1964-65-0x0000000077610000-0x0000000077612000-memory.dmp

memory/1964-69-0x0000000077610000-0x0000000077612000-memory.dmp

memory/1964-67-0x0000000077610000-0x0000000077612000-memory.dmp

memory/1964-70-0x0000000077620000-0x0000000077622000-memory.dmp

memory/1964-72-0x0000000077620000-0x0000000077622000-memory.dmp

memory/1964-74-0x0000000077620000-0x0000000077622000-memory.dmp

memory/1964-77-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp

memory/1964-79-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp

memory/1964-82-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp

memory/1964-84-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp

memory/1964-85-0x0000000077630000-0x0000000077632000-memory.dmp

memory/1964-87-0x0000000077630000-0x0000000077632000-memory.dmp

memory/1964-89-0x0000000077630000-0x0000000077632000-memory.dmp

memory/1964-90-0x0000000077440000-0x00000000775E9000-memory.dmp

memory/1964-91-0x000007FEF4D70000-0x000007FEF573A000-memory.dmp

memory/1964-92-0x0000000077440000-0x00000000775E9000-memory.dmp