Malware Analysis Report

2025-08-05 21:24

Sample ID 231222-gkyh7aaahj
Target 733cfb340ef4286d32d50f12d2ad0e57
SHA256 721791a7dca68f688d1960cad1fde6c6b10ce57b25ba35d0259fe038dcfcc3f1
Tags
upx vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

721791a7dca68f688d1960cad1fde6c6b10ce57b25ba35d0259fe038dcfcc3f1

Threat Level: Shows suspicious behavior

The file 733cfb340ef4286d32d50f12d2ad0e57 was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx vmprotect

UPX packed file

VMProtect packed file

Loads dropped DLL

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

Script User-Agent

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-22 05:52

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-22 05:52

Reported

2023-12-22 09:27

Platform

win7-20231215-en

Max time kernel

141s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe

"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.qqydw.com udp
US 167.88.180.85:80 www.qqydw.com tcp

Files

memory/1944-0-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-1-0x0000000002B50000-0x0000000002D1D000-memory.dmp

memory/1944-3-0x0000000002B50000-0x0000000002D1D000-memory.dmp

memory/1944-7-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-11-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-16-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-24-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-30-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-32-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-42-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-46-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-49-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-44-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-51-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-40-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-52-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-38-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-53-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-36-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-34-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-28-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-26-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-22-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-20-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-18-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-14-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-9-0x0000000010000000-0x0000000010039000-memory.dmp

\Users\Admin\AppData\Local\Temp\sqlite3.dll

MD5 99d4d43d695c0b07f863b24b160c39ad
SHA1 fb3ef61c5298875990b79e74a4b9079877e1ee0b
SHA256 a6f2ba77c8552da58396369bca6e97b7dce1f4c84884b7046f8d2fbbe9ebadef
SHA512 bad46b5d6f1ac989d606105581715308f03e055d087f21a4198437fd7fb7e0a7129aea95b96d8001db7d888162ecf4c3e16b3f13dec63574214bfdd64bac6f5a

memory/1944-57-0x00000000027C0000-0x0000000002845000-memory.dmp

memory/1944-62-0x0000000002B50000-0x0000000002D1D000-memory.dmp

memory/1944-63-0x0000000010000000-0x0000000010039000-memory.dmp

memory/1944-64-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-65-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-66-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-67-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-68-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-69-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-70-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-71-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-72-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-73-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-74-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-75-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-76-0x0000000000400000-0x000000000098B000-memory.dmp

memory/1944-77-0x0000000000400000-0x000000000098B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-22 05:52

Reported

2023-12-22 09:29

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

163s

Command Line

"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe

"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"

Network

Country Destination Domain Proto
US 20.231.121.79:80 tcp
US 8.8.8.8:53 23.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 www.qqydw.com udp
US 167.88.180.85:80 www.qqydw.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 85.180.88.167.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp

Files

memory/4804-0-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-1-0x0000000002B20000-0x0000000002CED000-memory.dmp

memory/4804-3-0x0000000002B20000-0x0000000002CED000-memory.dmp

memory/4804-4-0x0000000002B20000-0x0000000002CED000-memory.dmp

memory/4804-9-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-10-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-15-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-17-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-13-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-19-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-23-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-21-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-26-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-32-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-35-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-40-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-43-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-46-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-48-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-52-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-57-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-56-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-54-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-50-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-41-0x0000000002B20000-0x0000000002CED000-memory.dmp

memory/4804-38-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-37-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-30-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-28-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-63-0x0000000004B50000-0x0000000004BD5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sqlite3.dll

MD5 114da3974658f181301eeea879fd050d
SHA1 d623c896b6def03f57b58d0940dc3808feb71bef
SHA256 62af0086409d9746cd7a78443597f6f369e5e174b53d5f0317b85435e748b323
SHA512 375eaba8d7e8cf0738d7244f6cedfe5a63f0145de1dd42a825655c5b3f809d393c94dd514405d46694e18666f866ad760624aab64404260a2f34c6911d7ed299

C:\Users\Admin\AppData\Local\Temp\sqlite3.dll

MD5 b72444e81ca4a3f0363268df2fd44dcc
SHA1 7e00801e61509c4905cefdf4b84b72810956c1f4
SHA256 d70ef4817e404340dd0ed69fed996168e98a45c59c19124fa288ed0fbd2fafaa
SHA512 49bd2772ad7fbf820f9711c930128f3e0c583c628ac1cb9b13988c83959e0a94eb84e4bf1cc28eb174beba90e74b4c2f0649505b27122af89cb172d88f6dbc7e

C:\Users\Admin\AppData\Local\Temp\sqlite3.dll

MD5 c0d22e556df23ec5472cbd3554f938a4
SHA1 3390350530e6702047243b2b404446d6e098741c
SHA256 5644fe2889bf3755b1957d150f2ea6f2c66358a7c487d0b187151f1549e1d288
SHA512 19a55f04387843db437f7498bc989d32e0408c751bc80f17984656df2b1c2707489dece8c2dd498e83c8540c84703753c1e4909a45c4678e254d401872bdc905

memory/4804-69-0x0000000010000000-0x0000000010039000-memory.dmp

memory/4804-70-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-71-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-72-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-73-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-74-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-75-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-76-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-77-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-78-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-79-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-80-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-81-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-82-0x0000000000400000-0x000000000098B000-memory.dmp

memory/4804-83-0x0000000000400000-0x000000000098B000-memory.dmp