Malware Analysis Report

2024-11-30 23:27

Sample ID 230810-xw3kaagg23
Target 7b20822375127aaf2c2ec9d1f07a3007.exe
SHA256 3bc9a13ed11a0da691a2b97ddd52168dbead463fd5371916a1d574184c422a3c
Tags
vmprotect systembc trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3bc9a13ed11a0da691a2b97ddd52168dbead463fd5371916a1d574184c422a3c

Threat Level: Known bad

The file 7b20822375127aaf2c2ec9d1f07a3007.exe was found to be: Known bad.

Malicious Activity Summary

vmprotect systembc trojan

SystemBC

Blocklisted process makes network request

VMProtect packed file

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-10 19:13

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-10 19:13

Reported

2023-08-10 19:15

Platform

win7-20230712-en

Max time kernel

122s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1

Signatures

SystemBC

trojan systembc

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1

Network

Country Destination Domain Proto
RU 5.42.65.67:4298 tcp

Files

memory/2596-53-0x00000000775D0000-0x00000000775D2000-memory.dmp

memory/2596-56-0x000007FEF4DF0000-0x000007FEF57C1000-memory.dmp

memory/2596-55-0x00000000775D0000-0x00000000775D2000-memory.dmp

memory/2596-58-0x00000000775D0000-0x00000000775D2000-memory.dmp

memory/2596-59-0x00000000775E0000-0x00000000775E2000-memory.dmp

memory/2596-61-0x00000000775E0000-0x00000000775E2000-memory.dmp

memory/2596-63-0x00000000775E0000-0x00000000775E2000-memory.dmp

memory/2596-64-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/2596-66-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/2596-68-0x00000000775F0000-0x00000000775F2000-memory.dmp

memory/2596-69-0x0000000077600000-0x0000000077602000-memory.dmp

memory/2596-71-0x0000000077600000-0x0000000077602000-memory.dmp

memory/2596-73-0x0000000077600000-0x0000000077602000-memory.dmp

memory/2596-76-0x000007FEFD330000-0x000007FEFD332000-memory.dmp

memory/2596-78-0x000007FEFD330000-0x000007FEFD332000-memory.dmp

memory/2596-81-0x000007FEFD340000-0x000007FEFD342000-memory.dmp

memory/2596-83-0x000007FEFD340000-0x000007FEFD342000-memory.dmp

memory/2596-84-0x0000000077610000-0x0000000077612000-memory.dmp

memory/2596-86-0x0000000077610000-0x0000000077612000-memory.dmp

memory/2596-89-0x0000000077420000-0x00000000775C9000-memory.dmp

memory/2596-88-0x0000000077610000-0x0000000077612000-memory.dmp

memory/2596-90-0x000007FEF4DF0000-0x000007FEF57C1000-memory.dmp

memory/2596-91-0x0000000077420000-0x00000000775C9000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-10 19:13

Reported

2023-08-10 19:15

Platform

win10v2004-20230703-en

Max time kernel

138s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1

Signatures

SystemBC

trojan systembc

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
RU 5.42.65.67:4298 tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 86.8.109.52.in-addr.arpa udp
US 8.8.8.8:53 136.71.105.51.in-addr.arpa udp

Files

memory/1404-136-0x00007FFA57D90000-0x00007FFA58761000-memory.dmp

memory/1404-137-0x00007FFA75C10000-0x00007FFA75C12000-memory.dmp

memory/1404-138-0x00007FFA75C20000-0x00007FFA75C22000-memory.dmp

memory/1404-139-0x00007FFA75670000-0x00007FFA75672000-memory.dmp

memory/1404-140-0x00007FFA75680000-0x00007FFA75682000-memory.dmp

memory/1404-141-0x00007FFA73560000-0x00007FFA73562000-memory.dmp

memory/1404-142-0x00007FFA73570000-0x00007FFA73572000-memory.dmp

memory/1404-144-0x00007FFA75C30000-0x00007FFA75C32000-memory.dmp

memory/1404-145-0x00007FFA57D90000-0x00007FFA58761000-memory.dmp