Malware Analysis Report

2025-01-22 12:56

Sample ID 240522-ylvblaec5w
Target LogonUI.exe
SHA256 b1d1a672f434594579f109305c670b942b3a02303f37b17e97dacfdfc5911741
Tags
vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

b1d1a672f434594579f109305c670b942b3a02303f37b17e97dacfdfc5911741

Threat Level: Shows suspicious behavior

The file LogonUI.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

vmprotect

VMProtect packed file

Legitimate hosting services abused for malware hosting/C2

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-22 19:52

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 19:52

Reported

2024-05-22 19:55

Platform

win7-20240221-en

Max time kernel

119s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LogonUI.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LogonUI.exe

"C:\Users\Admin\AppData\Local\Temp\LogonUI.exe"

C:\Windows\system32\verclsid.exe

"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401

C:\Users\Admin\AppData\Local\Temp\LogonUI.exe

"C:\Users\Admin\AppData\Local\Temp\LogonUI.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 19:52

Reported

2024-05-22 19:53

Platform

win10v2004-20240508-en

Max time kernel

3s

Max time network

8s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LogonUI.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\LogonUI.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\LogonUI.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LogonUI.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\LogonUI.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\LogonUI.exe

"C:\Users\Admin\AppData\Local\Temp\LogonUI.exe"

Network

Country Destination Domain Proto
N/A 127.0.0.1:65288 tcp
N/A 127.0.0.1:65290 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
N/A 127.0.0.1:65296 tcp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.110.133:443 raw.githubusercontent.com tcp
N/A 127.0.0.1:65298 tcp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp

Files

memory/1988-0-0x000000014011B000-0x0000000140464000-memory.dmp

memory/1988-2-0x00007FFE4F7C0000-0x00007FFE4F7C2000-memory.dmp

memory/1988-3-0x0000000140000000-0x00000001409E2000-memory.dmp

memory/1988-1-0x00007FFE4F7B0000-0x00007FFE4F7B2000-memory.dmp