Analysis Overview
SHA256
391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d
Threat Level: Known bad
The file 391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe was found to be: Known bad.
Malicious Activity Summary
Detects executables packed with ASPack
Detects executables containing base64 encoded User Agent
Detects executables packed with ASPack
ASPack v2.12-2.42
Enumerates physical storage devices
Unsigned PE
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-02-29 05:21
Signatures
Detects executables packed with ASPack
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-02-29 05:21
Reported
2024-02-29 05:24
Platform
win7-20240221-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Detects executables containing base64 encoded User Agent
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects executables packed with ASPack
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe
"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ad.qqfarmer.com.cn | udp |
| US | 8.8.8.8:53 | bakad.qqfarmer.com.cn | udp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | images.qqfarmer.com.cn | udp |
| US | 8.8.8.8:53 | down.qqfarmer.com.cn | udp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | dl.qqfarmer.com.cn | udp |
| CN | 116.255.160.63:80 | dl.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| CN | 116.255.160.63:80 | dl.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | images.qqfarmer.com.cn | udp |
| CN | 122.228.223.239:80 | images.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | images.qqfarmer.com.cn | tcp |
Files
memory/2352-0-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-1-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-4-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-5-0x0000000000230000-0x0000000000231000-memory.dmp
C:\Users\Admin\Documents\QQÅ©ÄÁÖúÊÖ\user.dat.tmp
| MD5 | 767129174d494145e50d4f411f861754 |
| SHA1 | ffc4125c06f8476f3cbe6a5334f9c26c40ec348e |
| SHA256 | 24125095f984938fed962ae65c736b9e3242f63fe402778d36d04fb5de619abd |
| SHA512 | 524dce8628df6975f8ef41f0e2882b19aeb5b816906d82932d42e5a02f5e731314009acb3660193ad41fe4875619ea143f637a5d300019b660b4fefd49e2f6b4 |
memory/2352-15-0x00000000057E0000-0x00000000057E1000-memory.dmp
memory/2352-14-0x00000000056D0000-0x00000000056D1000-memory.dmp
memory/2352-16-0x0000000006230000-0x0000000006231000-memory.dmp
memory/2352-18-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-19-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-20-0x0000000000230000-0x0000000000231000-memory.dmp
memory/2352-21-0x00000000056D0000-0x00000000056D1000-memory.dmp
memory/2352-22-0x00000000057E0000-0x00000000057E1000-memory.dmp
memory/2352-23-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-24-0x0000000006230000-0x0000000006231000-memory.dmp
memory/2352-25-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-26-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-27-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-28-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-29-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-30-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-32-0x0000000000400000-0x0000000000972000-memory.dmp
memory/2352-33-0x0000000000400000-0x0000000000972000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-02-29 05:21
Reported
2024-02-29 05:24
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Detects executables containing base64 encoded User Agent
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects executables packed with ASPack
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe
"C:\Users\Admin\AppData\Local\Temp\391d0faf57a230b6e47debe38a9d2ba2a794b29713468e1a8c9917d79b8b636d.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ad.qqfarmer.com.cn | udp |
| US | 8.8.8.8:53 | bakad.qqfarmer.com.cn | udp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | 3.224.210.8.in-addr.arpa | udp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| HK | 8.210.224.3:80 | ad.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | images.qqfarmer.com.cn | udp |
| US | 8.8.8.8:53 | down.qqfarmer.com.cn | udp |
| CN | 122.228.223.240:80 | down.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | dl.qqfarmer.com.cn | udp |
| CN | 116.255.160.63:80 | dl.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| CN | 122.228.223.240:80 | down.qqfarmer.com.cn | tcp |
| CN | 122.228.223.239:80 | down.qqfarmer.com.cn | tcp |
| CN | 116.255.160.63:80 | dl.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | images.qqfarmer.com.cn | udp |
| CN | 122.228.223.239:80 | images.qqfarmer.com.cn | tcp |
| US | 52.111.227.14:443 | tcp | |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| CN | 122.228.223.239:80 | images.qqfarmer.com.cn | tcp |
| US | 8.8.8.8:53 | 6.173.189.20.in-addr.arpa | udp |
Files
memory/4552-0-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-1-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-2-0x0000000002710000-0x0000000002711000-memory.dmp
C:\Users\Admin\Documents\QQÅ©ÄÁÖúÊÖ\user.dat
| MD5 | c4e081876c474f6032ed3cbba81e2546 |
| SHA1 | fc48c39d8eed4cbcbfc1e5ad0063504a88ee8a0a |
| SHA256 | 38d49a4a942ff14ca6215d2b2b3377b6df21abe2777b6068f1f8076251ad722a |
| SHA512 | ac8116c2d147bdc20c26bc7d2615b57ec5921a5b605ee6562754ac40da67d748ccca4d848d0efe94546257c8d183308492d372dc8e3bde7d2f4a2457420268bf |
memory/4552-16-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
memory/4552-17-0x0000000004C20000-0x0000000004C21000-memory.dmp
memory/4552-18-0x0000000004C30000-0x0000000004C31000-memory.dmp
memory/4552-20-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-21-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-22-0x0000000002710000-0x0000000002711000-memory.dmp
memory/4552-23-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-24-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-25-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
memory/4552-26-0x0000000004C20000-0x0000000004C21000-memory.dmp
memory/4552-27-0x0000000004C30000-0x0000000004C31000-memory.dmp
memory/4552-28-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-29-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-30-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-31-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-32-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-33-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-35-0x0000000000400000-0x0000000000972000-memory.dmp
memory/4552-36-0x0000000000400000-0x0000000000972000-memory.dmp