Malware Analysis Report

2025-01-22 12:24

Sample ID 240517-zyz82sbb4w
Target 453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8
SHA256 453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8
Tags
aspackv2 persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8

Threat Level: Known bad

The file 453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8 was found to be: Known bad.

Malicious Activity Summary

aspackv2 persistence

Detects executables packed with ASPack

Detects executables packed with ASPack

Modifies AppInit DLL entries

Executes dropped EXE

ASPack v2.12-2.42

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of UnmapMainImage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-17 21:08

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-17 21:08

Reported

2024-05-17 21:10

Platform

win7-20240221-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\dbilzqh.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\zxoabnc.dll C:\PROGRA~3\Mozilla\dbilzqh.exe N/A
File created C:\PROGRA~3\Mozilla\dbilzqh.exe C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe N/A
N/A N/A C:\PROGRA~3\Mozilla\dbilzqh.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3024 wrote to memory of 2620 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\dbilzqh.exe
PID 3024 wrote to memory of 2620 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\dbilzqh.exe
PID 3024 wrote to memory of 2620 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\dbilzqh.exe
PID 3024 wrote to memory of 2620 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\dbilzqh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe

"C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {446108CA-636F-40BF-AE8A-97768ADA40B4} S-1-5-18:NT AUTHORITY\System:Service:

C:\PROGRA~3\Mozilla\dbilzqh.exe

C:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg

Network

N/A

Files

memory/1296-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1296-1-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1296-4-0x0000000000400000-0x000000000045B000-memory.dmp

memory/1296-3-0x0000000000260000-0x00000000002BB000-memory.dmp

memory/1296-2-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1296-6-0x0000000000400000-0x000000000045B000-memory.dmp

C:\PROGRA~3\Mozilla\dbilzqh.exe

MD5 3b7a849a21f4de8e490439b5c64846f9
SHA1 86cc02c52a06691f51b9c7f176d2177f14efb10d
SHA256 0ae976fa20037ee8392fbe386b2595a3af5c1d5079f76fa5802a159ee11ce718
SHA512 93162d7c54612467bbfb86682e6009d46d909b29efaba37dac9e23cb17dc15acd8e9e1f31b4ab819373dd7aa8fc7db1e58a4d7c224db500583fc60531311eb7c

memory/2620-9-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2620-10-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2620-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2620-12-0x0000000000460000-0x00000000004BB000-memory.dmp

memory/2620-13-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2620-15-0x0000000000400000-0x000000000045B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-17 21:08

Reported

2024-05-17 21:10

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe"

Signatures

Detects executables packed with ASPack

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\onvmijj.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\onvmijj.exe C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe N/A
File created C:\PROGRA~3\Mozilla\gmzywaj.dll C:\PROGRA~3\Mozilla\onvmijj.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe

"C:\Users\Admin\AppData\Local\Temp\453410eb72240cefbbd1af88b4cc940c9f4b549fdec2413ede4ca6e0a0d030a8.exe"

C:\PROGRA~3\Mozilla\onvmijj.exe

C:\PROGRA~3\Mozilla\onvmijj.exe -ibpmpgd

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
BE 88.221.83.250:443 www.bing.com tcp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 250.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 52.111.229.48:443 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 210.143.182.52.in-addr.arpa udp

Files

memory/4820-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4820-2-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4820-1-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4820-4-0x0000000000400000-0x000000000045B000-memory.dmp

memory/4820-3-0x00000000020A0000-0x00000000020FB000-memory.dmp

C:\ProgramData\Mozilla\onvmijj.exe

MD5 56cee9917735bb5e5e2196f9705043b9
SHA1 66e33ebbaf21a4d3f1d5767abd7806dc0a9929bf
SHA256 ec1b9b8899f7804b63209abc839964edfdb30ae66aa7a335d5fff59ed1902b06
SHA512 33a3b789bcb5ebd30f02c54e0901ebffed62698d4d58e7ca7dd044fa00a45d6a469a22829f8cc46dbdbea177e72c814a9bd8a35104b54e248901d430b337a32b

memory/3816-8-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3816-9-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4820-13-0x0000000000400000-0x000000000045B000-memory.dmp

memory/3816-12-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3816-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3816-16-0x0000000000400000-0x000000000045B000-memory.dmp