Analysis Overview
SHA256
721791a7dca68f688d1960cad1fde6c6b10ce57b25ba35d0259fe038dcfcc3f1
Threat Level: Shows suspicious behavior
The file 733cfb340ef4286d32d50f12d2ad0e57 was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
VMProtect packed file
Loads dropped DLL
Unsigned PE
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-12-22 05:52
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-22 05:52
Reported
2023-12-22 09:27
Platform
win7-20231215-en
Max time kernel
141s
Max time network
125s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe
"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.qqydw.com | udp |
| US | 167.88.180.85:80 | www.qqydw.com | tcp |
Files
memory/1944-0-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-1-0x0000000002B50000-0x0000000002D1D000-memory.dmp
memory/1944-3-0x0000000002B50000-0x0000000002D1D000-memory.dmp
memory/1944-7-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-11-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-16-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-24-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-30-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-32-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-42-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-46-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-49-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-44-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-51-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-40-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-52-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-38-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-53-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-36-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-34-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-28-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-26-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-22-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-20-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-18-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-14-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-9-0x0000000010000000-0x0000000010039000-memory.dmp
\Users\Admin\AppData\Local\Temp\sqlite3.dll
| MD5 | 99d4d43d695c0b07f863b24b160c39ad |
| SHA1 | fb3ef61c5298875990b79e74a4b9079877e1ee0b |
| SHA256 | a6f2ba77c8552da58396369bca6e97b7dce1f4c84884b7046f8d2fbbe9ebadef |
| SHA512 | bad46b5d6f1ac989d606105581715308f03e055d087f21a4198437fd7fb7e0a7129aea95b96d8001db7d888162ecf4c3e16b3f13dec63574214bfdd64bac6f5a |
memory/1944-57-0x00000000027C0000-0x0000000002845000-memory.dmp
memory/1944-62-0x0000000002B50000-0x0000000002D1D000-memory.dmp
memory/1944-63-0x0000000010000000-0x0000000010039000-memory.dmp
memory/1944-64-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-65-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-66-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-67-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-68-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-69-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-70-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-71-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-72-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-73-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-74-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-75-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-76-0x0000000000400000-0x000000000098B000-memory.dmp
memory/1944-77-0x0000000000400000-0x000000000098B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-12-22 05:52
Reported
2023-12-22 09:29
Platform
win10v2004-20231215-en
Max time kernel
142s
Max time network
163s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe
"C:\Users\Admin\AppData\Local\Temp\733cfb340ef4286d32d50f12d2ad0e57.exe"
Network
| Country | Destination | Domain | Proto |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 23.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.qqydw.com | udp |
| US | 167.88.180.85:80 | www.qqydw.com | tcp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 85.180.88.167.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 3.173.189.20.in-addr.arpa | udp |
Files
memory/4804-0-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-1-0x0000000002B20000-0x0000000002CED000-memory.dmp
memory/4804-3-0x0000000002B20000-0x0000000002CED000-memory.dmp
memory/4804-4-0x0000000002B20000-0x0000000002CED000-memory.dmp
memory/4804-9-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-10-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-15-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-17-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-13-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-19-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-23-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-21-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-26-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-32-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-35-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-40-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-43-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-46-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-48-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-52-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-57-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-56-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-54-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-50-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-41-0x0000000002B20000-0x0000000002CED000-memory.dmp
memory/4804-38-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-37-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-30-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-28-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-63-0x0000000004B50000-0x0000000004BD5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\sqlite3.dll
| MD5 | 114da3974658f181301eeea879fd050d |
| SHA1 | d623c896b6def03f57b58d0940dc3808feb71bef |
| SHA256 | 62af0086409d9746cd7a78443597f6f369e5e174b53d5f0317b85435e748b323 |
| SHA512 | 375eaba8d7e8cf0738d7244f6cedfe5a63f0145de1dd42a825655c5b3f809d393c94dd514405d46694e18666f866ad760624aab64404260a2f34c6911d7ed299 |
C:\Users\Admin\AppData\Local\Temp\sqlite3.dll
| MD5 | b72444e81ca4a3f0363268df2fd44dcc |
| SHA1 | 7e00801e61509c4905cefdf4b84b72810956c1f4 |
| SHA256 | d70ef4817e404340dd0ed69fed996168e98a45c59c19124fa288ed0fbd2fafaa |
| SHA512 | 49bd2772ad7fbf820f9711c930128f3e0c583c628ac1cb9b13988c83959e0a94eb84e4bf1cc28eb174beba90e74b4c2f0649505b27122af89cb172d88f6dbc7e |
C:\Users\Admin\AppData\Local\Temp\sqlite3.dll
| MD5 | c0d22e556df23ec5472cbd3554f938a4 |
| SHA1 | 3390350530e6702047243b2b404446d6e098741c |
| SHA256 | 5644fe2889bf3755b1957d150f2ea6f2c66358a7c487d0b187151f1549e1d288 |
| SHA512 | 19a55f04387843db437f7498bc989d32e0408c751bc80f17984656df2b1c2707489dece8c2dd498e83c8540c84703753c1e4909a45c4678e254d401872bdc905 |
memory/4804-69-0x0000000010000000-0x0000000010039000-memory.dmp
memory/4804-70-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-71-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-72-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-73-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-74-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-75-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-76-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-77-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-78-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-79-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-80-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-81-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-82-0x0000000000400000-0x000000000098B000-memory.dmp
memory/4804-83-0x0000000000400000-0x000000000098B000-memory.dmp