Analysis Overview
SHA256
f03a74ad67167ab4e9ac01760192ca3857c8765fb49124c2617852f952e858ac
Threat Level: Known bad
The file 2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber was found to be: Known bad.
Malicious Activity Summary
Detects executables packed with VMProtect.
Enumerates connected drives
Unsigned PE
Enumerates physical storage devices
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-28 20:24
Signatures
Detects executables packed with VMProtect.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-28 20:24
Reported
2024-05-28 20:27
Platform
win7-20240221-en
Max time kernel
119s
Max time network
124s
Command Line
Signatures
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\e: | C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe | N/A |
| File opened (read-only) | \??\h: | C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe | N/A |
Enumerates physical storage devices
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe
"C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | dlq.fqjh888.com | udp |
| CN | 111.223.15.248:3719 | dlq.fqjh888.com | tcp |
| US | 8.8.8.8:53 | dlq1.fqjh888.com | udp |
| US | 8.8.8.8:53 | dlq12.fqjh888.com | udp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-28 20:24
Reported
2024-05-28 20:27
Platform
win10v2004-20240508-en
Max time kernel
134s
Max time network
106s
Command Line
Signatures
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\e: | C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe | N/A |
| File opened (read-only) | \??\h: | C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe | N/A |
Enumerates physical storage devices
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe
"C:\Users\Admin\AppData\Local\Temp\2024-05-28_013ad31abdf8feb0aa2c945a5caa918c_avoslocker_magniber.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.113:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 113.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.113:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dlq.fqjh888.com | udp |
| CN | 111.223.15.248:3719 | dlq.fqjh888.com | tcp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | dlq1.fqjh888.com | udp |
| US | 8.8.8.8:53 | dlq12.fqjh888.com | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |