Analysis Overview
SHA256
4556f1263e810c735cf186826db18550aaf2ef361a3d620c3943f05b3b7a3f78
Threat Level: Shows suspicious behavior
The file 4f652c5e65f7f9b8aa0f380846ba3982 was found to be: Shows suspicious behavior.
Malicious Activity Summary
VMProtect packed file
Drops file in Windows directory
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-12-22 02:06
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-22 02:06
Reported
2023-12-22 06:09
Platform
win7-20231215-en
Max time kernel
122s
Max time network
127s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\windows\xgv21QxG.sys | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe
"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 101.34.253.186:9115 | tcp | |
| CN | 101.34.253.186:9115 | tcp |
Files
memory/1064-0-0x00000000001C0000-0x00000000001C1000-memory.dmp
memory/1064-2-0x00000000001C0000-0x00000000001C1000-memory.dmp
memory/1064-5-0x0000000000400000-0x0000000001C25000-memory.dmp
memory/1064-6-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1064-4-0x00000000001C0000-0x00000000001C1000-memory.dmp
memory/1064-8-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1064-10-0x0000000000260000-0x0000000000261000-memory.dmp
memory/1064-13-0x0000000000270000-0x0000000000271000-memory.dmp
memory/1064-25-0x0000000001C30000-0x0000000001C31000-memory.dmp
memory/1064-23-0x0000000001C30000-0x0000000001C31000-memory.dmp
memory/1064-20-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/1064-18-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/1064-15-0x0000000000270000-0x0000000000271000-memory.dmp
memory/1064-28-0x0000000001C40000-0x0000000001C41000-memory.dmp
memory/1064-30-0x0000000001C40000-0x0000000001C41000-memory.dmp
memory/1064-31-0x0000000001C50000-0x0000000001C51000-memory.dmp
memory/1064-33-0x0000000001C50000-0x0000000001C51000-memory.dmp
memory/1064-35-0x0000000001C50000-0x0000000001C51000-memory.dmp
memory/1064-37-0x0000000077C50000-0x0000000077C51000-memory.dmp
memory/1064-51-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-52-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-54-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-53-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-55-0x0000000000400000-0x0000000001C25000-memory.dmp
memory/1064-56-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-58-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-57-0x0000000003650000-0x0000000003690000-memory.dmp
memory/1064-60-0x00000000036E0000-0x00000000036E1000-memory.dmp
memory/1064-59-0x0000000003650000-0x0000000003690000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-12-22 02:06
Reported
2023-12-22 06:11
Platform
win10v2004-20231215-en
Max time kernel
175s
Max time network
208s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\windows\Zpd39cdb.sys | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe
"C:\Users\Admin\AppData\Local\Temp\4f652c5e65f7f9b8aa0f380846ba3982.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| CN | 101.34.253.186:9115 | tcp | |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| CN | 101.34.253.186:9115 | tcp | |
| US | 8.8.8.8:53 | 25.73.42.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
Files
memory/1316-0-0x0000000001CC0000-0x0000000001CC1000-memory.dmp
memory/1316-2-0x00000000023A0000-0x00000000023A1000-memory.dmp
memory/1316-1-0x0000000002390000-0x0000000002391000-memory.dmp
memory/1316-5-0x0000000000400000-0x0000000001C25000-memory.dmp
memory/1316-4-0x0000000003B10000-0x0000000003B11000-memory.dmp
memory/1316-3-0x0000000003B00000-0x0000000003B01000-memory.dmp
memory/1316-6-0x0000000003B20000-0x0000000003B21000-memory.dmp
memory/1316-7-0x0000000003B30000-0x0000000003B31000-memory.dmp
memory/1316-20-0x0000000000400000-0x0000000001C25000-memory.dmp
memory/1316-22-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-21-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-26-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-25-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-24-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-23-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-27-0x0000000000400000-0x0000000001C25000-memory.dmp
memory/1316-28-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-29-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-30-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-31-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-32-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-33-0x00000000048C0000-0x0000000004900000-memory.dmp
memory/1316-35-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-34-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-36-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-38-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-37-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-39-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-40-0x0000000001C80000-0x0000000001C81000-memory.dmp
memory/1316-41-0x0000000001C80000-0x0000000001C81000-memory.dmp