Analysis Overview
SHA256
3bc9a13ed11a0da691a2b97ddd52168dbead463fd5371916a1d574184c422a3c
Threat Level: Known bad
The file 7b20822375127aaf2c2ec9d1f07a3007.exe was found to be: Known bad.
Malicious Activity Summary
SystemBC
Blocklisted process makes network request
VMProtect packed file
Unsigned PE
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-08-10 19:13
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-10 19:13
Reported
2023-08-10 19:15
Platform
win7-20230712-en
Max time kernel
122s
Max time network
125s
Command Line
Signatures
SystemBC
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1
Network
| Country | Destination | Domain | Proto |
| RU | 5.42.65.67:4298 | tcp |
Files
memory/2596-53-0x00000000775D0000-0x00000000775D2000-memory.dmp
memory/2596-56-0x000007FEF4DF0000-0x000007FEF57C1000-memory.dmp
memory/2596-55-0x00000000775D0000-0x00000000775D2000-memory.dmp
memory/2596-58-0x00000000775D0000-0x00000000775D2000-memory.dmp
memory/2596-59-0x00000000775E0000-0x00000000775E2000-memory.dmp
memory/2596-61-0x00000000775E0000-0x00000000775E2000-memory.dmp
memory/2596-63-0x00000000775E0000-0x00000000775E2000-memory.dmp
memory/2596-64-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/2596-66-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/2596-68-0x00000000775F0000-0x00000000775F2000-memory.dmp
memory/2596-69-0x0000000077600000-0x0000000077602000-memory.dmp
memory/2596-71-0x0000000077600000-0x0000000077602000-memory.dmp
memory/2596-73-0x0000000077600000-0x0000000077602000-memory.dmp
memory/2596-76-0x000007FEFD330000-0x000007FEFD332000-memory.dmp
memory/2596-78-0x000007FEFD330000-0x000007FEFD332000-memory.dmp
memory/2596-81-0x000007FEFD340000-0x000007FEFD342000-memory.dmp
memory/2596-83-0x000007FEFD340000-0x000007FEFD342000-memory.dmp
memory/2596-84-0x0000000077610000-0x0000000077612000-memory.dmp
memory/2596-86-0x0000000077610000-0x0000000077612000-memory.dmp
memory/2596-89-0x0000000077420000-0x00000000775C9000-memory.dmp
memory/2596-88-0x0000000077610000-0x0000000077612000-memory.dmp
memory/2596-90-0x000007FEF4DF0000-0x000007FEF57C1000-memory.dmp
memory/2596-91-0x0000000077420000-0x00000000775C9000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-10 19:13
Reported
2023-08-10 19:15
Platform
win10v2004-20230703-en
Max time kernel
138s
Max time network
154s
Command Line
Signatures
SystemBC
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b20822375127aaf2c2ec9d1f07a3007.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| RU | 5.42.65.67:4298 | tcp | |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.8.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 136.71.105.51.in-addr.arpa | udp |
Files
memory/1404-136-0x00007FFA57D90000-0x00007FFA58761000-memory.dmp
memory/1404-137-0x00007FFA75C10000-0x00007FFA75C12000-memory.dmp
memory/1404-138-0x00007FFA75C20000-0x00007FFA75C22000-memory.dmp
memory/1404-139-0x00007FFA75670000-0x00007FFA75672000-memory.dmp
memory/1404-140-0x00007FFA75680000-0x00007FFA75682000-memory.dmp
memory/1404-141-0x00007FFA73560000-0x00007FFA73562000-memory.dmp
memory/1404-142-0x00007FFA73570000-0x00007FFA73572000-memory.dmp
memory/1404-144-0x00007FFA75C30000-0x00007FFA75C32000-memory.dmp
memory/1404-145-0x00007FFA57D90000-0x00007FFA58761000-memory.dmp