Malware Analysis Report

2025-08-05 21:25

Sample ID 231222-cjnkdafbfl
Target 4f652c5e65f7f9b8aa0f380846ba3982
SHA256 4556f1263e810c735cf186826db18550aaf2ef361a3d620c3943f05b3b7a3f78
Tags
vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

4556f1263e810c735cf186826db18550aaf2ef361a3d620c3943f05b3b7a3f78

Threat Level: Shows suspicious behavior

The file 4f652c5e65f7f9b8aa0f380846ba3982 was found to be: Shows suspicious behavior.

Malicious Activity Summary

vmprotect

VMProtect packed file

Drops file in Windows directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: LoadsDriver

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-22 02:06

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-22 02:06

Reported

2023-12-22 06:09

Platform

win7-20231215-en

Max time kernel

122s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\windows\xgv21QxG.sys C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe

"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"

Network

Country Destination Domain Proto
CN 101.34.253.186:9115 tcp
CN 101.34.253.186:9115 tcp

Files

memory/1064-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/1064-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/1064-5-0x0000000000400000-0x0000000001C25000-memory.dmp

memory/1064-6-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1064-4-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/1064-8-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1064-10-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1064-13-0x0000000000270000-0x0000000000271000-memory.dmp

memory/1064-25-0x0000000001C30000-0x0000000001C31000-memory.dmp

memory/1064-23-0x0000000001C30000-0x0000000001C31000-memory.dmp

memory/1064-20-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/1064-18-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/1064-15-0x0000000000270000-0x0000000000271000-memory.dmp

memory/1064-28-0x0000000001C40000-0x0000000001C41000-memory.dmp

memory/1064-30-0x0000000001C40000-0x0000000001C41000-memory.dmp

memory/1064-31-0x0000000001C50000-0x0000000001C51000-memory.dmp

memory/1064-33-0x0000000001C50000-0x0000000001C51000-memory.dmp

memory/1064-35-0x0000000001C50000-0x0000000001C51000-memory.dmp

memory/1064-37-0x0000000077C50000-0x0000000077C51000-memory.dmp

memory/1064-51-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-52-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-54-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-53-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-55-0x0000000000400000-0x0000000001C25000-memory.dmp

memory/1064-56-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-58-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-57-0x0000000003650000-0x0000000003690000-memory.dmp

memory/1064-60-0x00000000036E0000-0x00000000036E1000-memory.dmp

memory/1064-59-0x0000000003650000-0x0000000003690000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-22 02:06

Reported

2023-12-22 06:11

Platform

win10v2004-20231215-en

Max time kernel

175s

Max time network

208s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\windows\Zpd39cdb.sys C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe

"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 1.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
CN 101.34.253.186:9115 tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
CN 101.34.253.186:9115 tcp
US 8.8.8.8:53 25.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp

Files

memory/1316-0-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

memory/1316-2-0x00000000023A0000-0x00000000023A1000-memory.dmp

memory/1316-1-0x0000000002390000-0x0000000002391000-memory.dmp

memory/1316-5-0x0000000000400000-0x0000000001C25000-memory.dmp

memory/1316-4-0x0000000003B10000-0x0000000003B11000-memory.dmp

memory/1316-3-0x0000000003B00000-0x0000000003B01000-memory.dmp

memory/1316-6-0x0000000003B20000-0x0000000003B21000-memory.dmp

memory/1316-7-0x0000000003B30000-0x0000000003B31000-memory.dmp

memory/1316-20-0x0000000000400000-0x0000000001C25000-memory.dmp

memory/1316-22-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-21-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-26-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-25-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-24-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-23-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-27-0x0000000000400000-0x0000000001C25000-memory.dmp

memory/1316-28-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-29-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-30-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-31-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-32-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-33-0x00000000048C0000-0x0000000004900000-memory.dmp

memory/1316-35-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-34-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-36-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-38-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-37-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-39-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-40-0x0000000001C80000-0x0000000001C81000-memory.dmp

memory/1316-41-0x0000000001C80000-0x0000000001C81000-memory.dmp