Malware Analysis Report

2025-08-11 01:26

Sample ID 240229-h8ddlaab2v
Target HEUR-Trojan.Win32.Agent.gen-c80800ba815c9a0d125222656af33c1028691da1be6988985cbb18dc806660fe
SHA256 c80800ba815c9a0d125222656af33c1028691da1be6988985cbb18dc806660fe
Tags
aspackv2 persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c80800ba815c9a0d125222656af33c1028691da1be6988985cbb18dc806660fe

Threat Level: Known bad

The file HEUR-Trojan.Win32.Agent.gen-c80800ba815c9a0d125222656af33c1028691da1be6988985cbb18dc806660fe was found to be: Known bad.

Malicious Activity Summary

aspackv2 persistence

Detects executables packed with ASPack

Detects executables packed with ASPack

Modifies AppInit DLL entries

ASPack v2.12-2.42

Executes dropped EXE

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of UnmapMainImage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-29 07:24

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-29 07:24

Reported

2024-02-29 07:26

Platform

win7-20240220-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\wrvdfyg.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\wrvdfyg.exe C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe N/A
File created C:\PROGRA~3\Mozilla\klztrnd.dll C:\PROGRA~3\Mozilla\wrvdfyg.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe N/A
N/A N/A C:\PROGRA~3\Mozilla\wrvdfyg.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1212 wrote to memory of 2548 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\wrvdfyg.exe
PID 1212 wrote to memory of 2548 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\wrvdfyg.exe
PID 1212 wrote to memory of 2548 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\wrvdfyg.exe
PID 1212 wrote to memory of 2548 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\wrvdfyg.exe

Processes

C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe

"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {C15209D7-CF94-48BE-93CC-193592C5932B} S-1-5-18:NT AUTHORITY\System:Service:

C:\PROGRA~3\Mozilla\wrvdfyg.exe

C:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia

Network

N/A

Files

memory/3028-0-0x0000000000400000-0x0000000000469000-memory.dmp

memory/3028-1-0x0000000000400000-0x0000000000469000-memory.dmp

memory/3028-3-0x0000000000400000-0x000000000045B000-memory.dmp

memory/3028-4-0x0000000000250000-0x00000000002AC000-memory.dmp

memory/3028-2-0x0000000000400000-0x0000000000469000-memory.dmp

memory/3028-6-0x0000000000400000-0x000000000045B000-memory.dmp

C:\PROGRA~3\Mozilla\wrvdfyg.exe

MD5 33df1b7161e268ea11038d00e7bb81bd
SHA1 2afe857db4b25f8617f90a34f5c87c62e3908c4f
SHA256 8ddfeb2dea4ff2dbcca92d2de05fc1367cf828ff9faa30ef00ed232d964369f8
SHA512 345067f917d2dc0e7412693eb2039232cba0644a2ebfcb4fe73fe7d1286e769871a7c2e30c17e477d9e3a48ae89bd3bf7d1aa9932e6536f0cfe3516652d2cfc1

memory/2548-9-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2548-10-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2548-11-0x00000000008A0000-0x00000000008FC000-memory.dmp

memory/2548-12-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2548-14-0x0000000000400000-0x000000000045B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-29 07:24

Reported

2024-02-29 07:26

Platform

win10v2004-20240226-en

Max time kernel

147s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\cpqnwfa.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\cpqnwfa.exe C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe N/A
File created C:\PROGRA~3\Mozilla\czsujhg.dll C:\PROGRA~3\Mozilla\cpqnwfa.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe

"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Agent.exe"

C:\PROGRA~3\Mozilla\cpqnwfa.exe

C:\PROGRA~3\Mozilla\cpqnwfa.exe -lhvfjoj

Network

Country Destination Domain Proto
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 187.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 199.111.78.13.in-addr.arpa udp

Files

memory/2576-0-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2576-1-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2576-2-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2576-3-0x0000000000700000-0x000000000075C000-memory.dmp

memory/2576-4-0x0000000000400000-0x000000000045B000-memory.dmp

C:\ProgramData\Mozilla\cpqnwfa.exe

MD5 338fcb35e945faecae997832d293b4cd
SHA1 eb03536e18775b4a351beb58181b7da3fb48606f
SHA256 8889368a477d5a93ab3b2c5ab01568a6146f4d17d6e0841b86589c33585aa4a6
SHA512 8fb562fb452a6a600322424ba841cb351530f3f1f7a6e757af286eb3ba56431093d8b7b4dabb6b9ab4a1c6cd6dd4ac3dd7e2cb1b55a7e337a8cdaa4a39b7a782

C:\PROGRA~3\Mozilla\cpqnwfa.exe

MD5 0ae22d8c518aaa8b89cc0ee4802aaee8
SHA1 39c9dd4c72c14303c52f4730d30f91025ab04901
SHA256 c407394e342047cb3105bd3b8154aaba2038ead42ae7b09831f6f59365fc976a
SHA512 a24f87b63fe484367c754a46ada59dabeabf3c2301179de70d116db78bc4ebd174c2619be5b91e72ce3309b34a142ea3e47ba7615c83a329841dec43e19a467e

memory/2576-9-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2576-10-0x0000000000700000-0x000000000075C000-memory.dmp

memory/2036-11-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2036-12-0x0000000000400000-0x0000000000469000-memory.dmp

memory/2036-13-0x0000000000DC0000-0x0000000000E1C000-memory.dmp

memory/2036-14-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2036-17-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2036-18-0x0000000000DC0000-0x0000000000E1C000-memory.dmp