Analysis Overview
SHA256
8b859d5ecc1b28c53a17a459d2a8f8809d01de48aec75c7ab56de5ed131bf5b3
Threat Level: Shows suspicious behavior
The file 505bd64df3b42e7e9eec99641dfb94b3 was found to be: Shows suspicious behavior.
Malicious Activity Summary
VMProtect packed file
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-01-10 10:51
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-10 10:51
Reported
2024-01-10 10:55
Platform
win7-20231215-en
Max time kernel
119s
Max time network
123s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe
"C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe"
Network
Files
memory/2476-2-0x0000000000400000-0x0000000000B8B000-memory.dmp
memory/2476-30-0x0000000000320000-0x0000000000321000-memory.dmp
memory/2476-28-0x0000000000320000-0x0000000000321000-memory.dmp
memory/2476-25-0x0000000000310000-0x0000000000311000-memory.dmp
memory/2476-23-0x0000000000310000-0x0000000000311000-memory.dmp
memory/2476-20-0x0000000000300000-0x0000000000301000-memory.dmp
memory/2476-18-0x0000000000300000-0x0000000000301000-memory.dmp
memory/2476-15-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/2476-13-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/2476-10-0x00000000002E0000-0x00000000002E1000-memory.dmp
memory/2476-8-0x00000000002E0000-0x00000000002E1000-memory.dmp
memory/2476-6-0x00000000002E0000-0x00000000002E1000-memory.dmp
memory/2476-5-0x0000000000250000-0x0000000000251000-memory.dmp
memory/2476-3-0x0000000000250000-0x0000000000251000-memory.dmp
memory/2476-34-0x0000000000400000-0x0000000000B8B000-memory.dmp
memory/2476-0-0x0000000000250000-0x0000000000251000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-10 10:51
Reported
2024-01-10 10:54
Platform
win10v2004-20231215-en
Max time kernel
145s
Max time network
200s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe
"C:\Users\Admin\AppData\Local\Temp\505bd64df3b42e7e9eec99641dfb94b3.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 190.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 114.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 187.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 84.65.42.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/1884-0-0x0000000000400000-0x0000000000B8B000-memory.dmp
memory/1884-1-0x0000000001160000-0x0000000001161000-memory.dmp
memory/1884-2-0x0000000001170000-0x0000000001171000-memory.dmp
memory/1884-3-0x0000000001180000-0x0000000001181000-memory.dmp
memory/1884-4-0x00000000011B0000-0x00000000011B1000-memory.dmp
memory/1884-5-0x00000000011D0000-0x00000000011D1000-memory.dmp
memory/1884-6-0x0000000002A90000-0x0000000002A91000-memory.dmp
memory/1884-10-0x0000000000400000-0x0000000000B8B000-memory.dmp