Malware Analysis Report

2025-08-11 01:26

Sample ID 240229-f16n3aeh4v
Target 391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe
SHA256 391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d
Tags
aspackv2
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d

Threat Level: Known bad

The file 391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe was found to be: Known bad.

Malicious Activity Summary

aspackv2

Detects executables packed with ASPack

Detects executables containing base64 encoded User Agent

Detects executables packed with ASPack

ASPack v2.12-2.42

Enumerates physical storage devices

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-29 05:21

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-29 05:21

Reported

2024-02-29 05:24

Platform

win7-20240221-en

Max time kernel

118s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"

Signatures

Detects executables containing base64 encoded User Agent

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe

"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ad.qqfarmer.com.cn udp
US 8.8.8.8:53 bakad.qqfarmer.com.cn udp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
US 8.8.8.8:53 images.qqfarmer.com.cn udp
US 8.8.8.8:53 down.qqfarmer.com.cn udp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
US 8.8.8.8:53 dl.qqfarmer.com.cn udp
CN 116.255.160.63:80 dl.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
CN 116.255.160.63:80 dl.qqfarmer.com.cn tcp
US 8.8.8.8:53 images.qqfarmer.com.cn udp
CN 122.228.223.239:80 images.qqfarmer.com.cn tcp
CN 122.228.223.239:80 images.qqfarmer.com.cn tcp

Files

memory/2352-0-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-1-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-4-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-5-0x0000000000230000-0x0000000000231000-memory.dmp

C:\Users\Admin\Documents\QQÅ©ÄÁÖúÊÖ\user.dat.tmp

MD5 767129174d494145e50d4f411f861754
SHA1 ffc4125c06f8476f3cbe6a5334f9c26c40ec348e
SHA256 24125095f984938fed962ae65c736b9e3242f63fe402778d36d04fb5de619abd
SHA512 524dce8628df6975f8ef41f0e2882b19aeb5b816906d82932d42e5a02f5e731314009acb3660193ad41fe4875619ea143f637a5d300019b660b4fefd49e2f6b4

memory/2352-15-0x00000000057E0000-0x00000000057E1000-memory.dmp

memory/2352-14-0x00000000056D0000-0x00000000056D1000-memory.dmp

memory/2352-16-0x0000000006230000-0x0000000006231000-memory.dmp

memory/2352-18-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-19-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-20-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2352-21-0x00000000056D0000-0x00000000056D1000-memory.dmp

memory/2352-22-0x00000000057E0000-0x00000000057E1000-memory.dmp

memory/2352-23-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-24-0x0000000006230000-0x0000000006231000-memory.dmp

memory/2352-25-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-26-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-27-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-28-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-29-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-30-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-32-0x0000000000400000-0x0000000000972000-memory.dmp

memory/2352-33-0x0000000000400000-0x0000000000972000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-29 05:21

Reported

2024-02-29 05:24

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"

Signatures

Detects executables containing base64 encoded User Agent

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe

"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 ad.qqfarmer.com.cn udp
US 8.8.8.8:53 bakad.qqfarmer.com.cn udp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
US 8.8.8.8:53 3.224.210.8.in-addr.arpa udp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
HK 8.210.224.3:80 ad.qqfarmer.com.cn tcp
US 8.8.8.8:53 images.qqfarmer.com.cn udp
US 8.8.8.8:53 down.qqfarmer.com.cn udp
CN 122.228.223.240:80 down.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
US 8.8.8.8:53 dl.qqfarmer.com.cn udp
CN 116.255.160.63:80 dl.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
CN 122.228.223.240:80 down.qqfarmer.com.cn tcp
CN 122.228.223.239:80 down.qqfarmer.com.cn tcp
CN 116.255.160.63:80 dl.qqfarmer.com.cn tcp
US 8.8.8.8:53 images.qqfarmer.com.cn udp
CN 122.228.223.239:80 images.qqfarmer.com.cn tcp
US 52.111.227.14:443 tcp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
CN 122.228.223.239:80 images.qqfarmer.com.cn tcp
US 8.8.8.8:53 6.173.189.20.in-addr.arpa udp

Files

memory/4552-0-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-1-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-2-0x0000000002710000-0x0000000002711000-memory.dmp

C:\Users\Admin\Documents\QQÅ©ÄÁÖúÊÖ\user.dat

MD5 c4e081876c474f6032ed3cbba81e2546
SHA1 fc48c39d8eed4cbcbfc1e5ad0063504a88ee8a0a
SHA256 38d49a4a942ff14ca6215d2b2b3377b6df21abe2777b6068f1f8076251ad722a
SHA512 ac8116c2d147bdc20c26bc7d2615b57ec5921a5b605ee6562754ac40da67d748ccca4d848d0efe94546257c8d183308492d372dc8e3bde7d2f4a2457420268bf

memory/4552-16-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

memory/4552-17-0x0000000004C20000-0x0000000004C21000-memory.dmp

memory/4552-18-0x0000000004C30000-0x0000000004C31000-memory.dmp

memory/4552-20-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-21-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-22-0x0000000002710000-0x0000000002711000-memory.dmp

memory/4552-23-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-24-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-25-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

memory/4552-26-0x0000000004C20000-0x0000000004C21000-memory.dmp

memory/4552-27-0x0000000004C30000-0x0000000004C31000-memory.dmp

memory/4552-28-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-29-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-30-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-31-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-32-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-33-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-35-0x0000000000400000-0x0000000000972000-memory.dmp

memory/4552-36-0x0000000000400000-0x0000000000972000-memory.dmp