Analysis Overview
SHA256
470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3
Threat Level: Known bad
The file 470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3 was found to be: Known bad.
Malicious Activity Summary
Detects executables packed with VMProtect.
Detects executables packed with VMProtect.
UPX dump on OEP (original entry point)
VMProtect packed file
Unsigned PE
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-27 21:11
Signatures
Detects executables packed with VMProtect.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-27 21:11
Reported
2024-06-27 21:13
Platform
win7-20240221-en
Max time kernel
117s
Max time network
120s
Command Line
Signatures
Detects executables packed with VMProtect.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe
"C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe"
Network
Files
memory/2168-0-0x0000000000400000-0x0000000001375000-memory.dmp
memory/2168-1-0x0000000000400000-0x0000000001375000-memory.dmp
memory/2168-3-0x0000000000400000-0x0000000001375000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-27 21:11
Reported
2024-06-27 21:13
Platform
win10v2004-20240508-en
Max time kernel
93s
Max time network
95s
Command Line
Signatures
Detects executables packed with VMProtect.
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe
"C:\Users\Admin\AppData\Local\Temp\470c06bacbebc7f47fc96ade730b097d50d05ec63b6fc8b1378e12e36711fbb3.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.58.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
memory/4300-1-0x0000000000E44000-0x0000000000E46000-memory.dmp
memory/4300-0-0x0000000000400000-0x0000000001375000-memory.dmp
memory/4300-2-0x0000000000400000-0x0000000001375000-memory.dmp
memory/4300-4-0x0000000000400000-0x0000000001375000-memory.dmp