Analysis Overview
SHA256
7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609
Threat Level: Shows suspicious behavior
The file 7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609 was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
VMProtect packed file
Enumerates connected drives
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-26 08:25
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-26 08:25
Reported
2024-06-26 08:27
Platform
win7-20240611-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\E: | C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe | N/A |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe
"C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip1.yinliu2.com | udp |
| CN | 222.211.73.252:3002 | ip1.yinliu2.com | tcp |
| CN | 222.211.73.252:3001 | ip1.yinliu2.com | tcp |
| CN | 222.211.73.252:3000 | ip1.yinliu2.com | tcp |
Files
memory/2208-2-0x0000000000270000-0x0000000000271000-memory.dmp
memory/2208-0-0x0000000000270000-0x0000000000271000-memory.dmp
memory/2208-4-0x0000000000270000-0x0000000000271000-memory.dmp
memory/2208-36-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-14-0x00000000002A0000-0x00000000002A1000-memory.dmp
memory/2208-12-0x00000000002A0000-0x00000000002A1000-memory.dmp
memory/2208-9-0x0000000000290000-0x0000000000291000-memory.dmp
memory/2208-7-0x0000000000290000-0x0000000000291000-memory.dmp
memory/2208-5-0x0000000000290000-0x0000000000291000-memory.dmp
memory/2208-34-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/2208-39-0x00000000003D0000-0x00000000003F6000-memory.dmp
memory/2208-38-0x0000000000300000-0x0000000000326000-memory.dmp
memory/2208-32-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/2208-30-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/2208-29-0x00000000002E0000-0x00000000002E1000-memory.dmp
memory/2208-27-0x00000000002E0000-0x00000000002E1000-memory.dmp
memory/2208-24-0x00000000002D0000-0x00000000002D1000-memory.dmp
memory/2208-22-0x00000000002D0000-0x00000000002D1000-memory.dmp
memory/2208-19-0x00000000002C0000-0x00000000002C1000-memory.dmp
memory/2208-17-0x00000000002C0000-0x00000000002C1000-memory.dmp
memory/2208-40-0x0000000000715000-0x0000000000DC0000-memory.dmp
memory/2208-41-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-42-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-43-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-44-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-45-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-46-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2208-47-0x0000000000400000-0x00000000015F6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-26 08:25
Reported
2024-06-26 08:27
Platform
win10v2004-20240611-en
Max time kernel
133s
Max time network
104s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\E: | C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe
"C:\Users\Admin\AppData\Local\Temp\7b18037403e8078c1cc78639ce4297a7ab38379311c273410b72995237dc1609.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ip1.yinliu2.com | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| CN | 222.211.73.252:3001 | ip1.yinliu2.com | tcp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| BE | 88.221.83.226:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 226.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| CN | 222.211.73.252:3002 | ip1.yinliu2.com | tcp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| CN | 222.211.73.252:3000 | ip1.yinliu2.com | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
memory/2244-2-0x0000000001BF0000-0x0000000001BF1000-memory.dmp
memory/2244-1-0x0000000001BE0000-0x0000000001BE1000-memory.dmp
memory/2244-0-0x00000000018D0000-0x00000000018D1000-memory.dmp
memory/2244-8-0x0000000000715000-0x0000000000DC0000-memory.dmp
memory/2244-6-0x0000000001C50000-0x0000000001C51000-memory.dmp
memory/2244-5-0x0000000001C40000-0x0000000001C41000-memory.dmp
memory/2244-4-0x0000000001C30000-0x0000000001C31000-memory.dmp
memory/2244-3-0x0000000001C20000-0x0000000001C21000-memory.dmp
memory/2244-7-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-12-0x0000000003860000-0x0000000003886000-memory.dmp
memory/2244-11-0x0000000001D00000-0x0000000001D26000-memory.dmp
memory/2244-13-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-14-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-15-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-16-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-17-0x0000000000400000-0x00000000015F6000-memory.dmp
memory/2244-18-0x0000000000400000-0x00000000015F6000-memory.dmp