Malware Analysis Report

2025-03-15 05:44

Sample ID 240509-a8xhgahb8w
Target 82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5
SHA256 82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5
Tags
aspackv2 persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5

Threat Level: Known bad

The file 82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5 was found to be: Known bad.

Malicious Activity Summary

aspackv2 persistence

Detects executables packed with ASPack

Detects executables packed with ASPack

Modifies AppInit DLL entries

ASPack v2.12-2.42

Executes dropped EXE

Drops file in Program Files directory

Unsigned PE

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-09 00:53

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-09 00:53

Reported

2024-05-09 00:56

Platform

win7-20240508-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\gugcane.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\gugcane.exe C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe N/A
File created C:\PROGRA~3\Mozilla\zynbtfl.dll C:\PROGRA~3\Mozilla\gugcane.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe N/A
N/A N/A C:\PROGRA~3\Mozilla\gugcane.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2648 wrote to memory of 3044 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\gugcane.exe
PID 2648 wrote to memory of 3044 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\gugcane.exe
PID 2648 wrote to memory of 3044 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\gugcane.exe
PID 2648 wrote to memory of 3044 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\gugcane.exe

Processes

C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe

"C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {4E1FA062-DDC1-4D87-9369-4D362D71C681} S-1-5-18:NT AUTHORITY\System:Service:

C:\PROGRA~3\Mozilla\gugcane.exe

C:\PROGRA~3\Mozilla\gugcane.exe -eoikpie

Network

N/A

Files

memory/2928-1-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2928-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2928-2-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2928-4-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2928-3-0x0000000000260000-0x00000000002BB000-memory.dmp

memory/2928-6-0x0000000000400000-0x000000000045B000-memory.dmp

C:\PROGRA~3\Mozilla\gugcane.exe

MD5 45b5501528e775d53e671df40f43699a
SHA1 403bca161c1e3aa99d7229155d46aec0d571d7d6
SHA256 1d0ae605a3ee22b328827592561fca70ceee68f7a066044a2969b137fc5dc632
SHA512 bd999ab0cce142c927fccaf53a5cc1f11d9d1012757dcdb80758bfb228ae54fafea3bbedbe4621f890ecca2d453e769508953af7405171bf76ab3691a61a0abc

memory/3044-9-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3044-10-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3044-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3044-12-0x00000000004D0000-0x000000000052B000-memory.dmp

memory/3044-13-0x0000000000400000-0x000000000045B000-memory.dmp

memory/3044-15-0x0000000000400000-0x000000000045B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-09 00:53

Reported

2024-05-09 00:56

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\ykjyebb.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\ykjyebb.exe C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe N/A
File created C:\PROGRA~3\Mozilla\pjitnjk.dll C:\PROGRA~3\Mozilla\ykjyebb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe

"C:\Users\Admin\AppData\Local\Temp\82347e873828be07ca4eb76a971467fa77146f088e6111a82b34b06a55a8b7e5.exe"

C:\PROGRA~3\Mozilla\ykjyebb.exe

C:\PROGRA~3\Mozilla\ykjyebb.exe -aryugnm

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

memory/2824-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2824-3-0x0000000000610000-0x000000000066B000-memory.dmp

memory/2824-4-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2824-2-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2824-1-0x0000000000400000-0x000000000045E000-memory.dmp

C:\ProgramData\Mozilla\ykjyebb.exe

MD5 50d9452d9e394a0336a6065a9cc2424f
SHA1 24b4fd80287b8e3fbc3e6ef7643eb08d7d22d2f0
SHA256 ec5901b2af0aabedcbae6fdb5d09a093fa0907ae7a04a5a0db088efb5d805634
SHA512 662610205d5807032378c41f2b15443244b43d163c12b3fdd455c9ba0d6e2bbd5a2096ca10315a54cb7d7808859035147d71fdf90a8d44800f5afbc0c01a8b28

memory/2372-9-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2372-8-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2372-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2372-10-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2372-12-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2824-14-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2372-17-0x0000000000400000-0x000000000045B000-memory.dmp