Analysis Overview
SHA256
d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa
Threat Level: Shows suspicious behavior
The file d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
VMProtect packed file
Enumerates connected drives
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-28 05:26
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-28 05:26
Reported
2024-06-28 05:28
Platform
win7-20240611-en
Max time kernel
149s
Max time network
119s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\E: | C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe
"C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 124.222.74.120:80 | tcp | |
| CN | 124.222.74.120:80 | tcp | |
| US | 8.8.8.8:53 | ip.yinliu2.com | udp |
| HK | 8.218.194.237:80 | ip.yinliu2.com | tcp |
| CN | 222.211.73.252:3001 | tcp | |
| CN | 222.211.73.252:3000 | tcp | |
| CN | 222.211.73.252:3002 | tcp |
Files
memory/3000-0-0x0000000000230000-0x0000000000231000-memory.dmp
memory/3000-29-0x00000000002A0000-0x00000000002A1000-memory.dmp
memory/3000-34-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/3000-32-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/3000-30-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/3000-27-0x00000000002A0000-0x00000000002A1000-memory.dmp
memory/3000-24-0x0000000000290000-0x0000000000291000-memory.dmp
memory/3000-22-0x0000000000290000-0x0000000000291000-memory.dmp
memory/3000-19-0x0000000000280000-0x0000000000281000-memory.dmp
memory/3000-17-0x0000000000280000-0x0000000000281000-memory.dmp
memory/3000-14-0x0000000000260000-0x0000000000261000-memory.dmp
memory/3000-12-0x0000000000260000-0x0000000000261000-memory.dmp
memory/3000-9-0x0000000000250000-0x0000000000251000-memory.dmp
memory/3000-7-0x0000000000250000-0x0000000000251000-memory.dmp
memory/3000-5-0x0000000000250000-0x0000000000251000-memory.dmp
memory/3000-4-0x0000000000230000-0x0000000000231000-memory.dmp
memory/3000-2-0x0000000000230000-0x0000000000231000-memory.dmp
memory/3000-36-0x0000000000400000-0x000000000155D000-memory.dmp
memory/3000-82-0x0000000000707000-0x0000000000D95000-memory.dmp
memory/3000-83-0x0000000000400000-0x000000000155D000-memory.dmp
memory/3000-65-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-84-0x0000000000400000-0x000000000155D000-memory.dmp
memory/3000-63-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-85-0x0000000000400000-0x000000000155D000-memory.dmp
memory/3000-61-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-59-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-57-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-55-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-53-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-51-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-49-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-47-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-45-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-43-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-41-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-40-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-39-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3000-38-0x0000000002FF0000-0x0000000003016000-memory.dmp
memory/3000-86-0x0000000000400000-0x000000000155D000-memory.dmp
memory/3000-87-0x0000000000400000-0x000000000155D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-28 05:26
Reported
2024-06-28 05:28
Platform
win10v2004-20240508-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\E: | C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe
"C:\Users\Admin\AppData\Local\Temp\d81c56f10cef07a9c63098f8465635b1cba6d755494fb9c2ffd2fb0ae029feaa.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 124.222.74.120:80 | tcp | |
| US | 8.8.8.8:53 | ip.yinliu2.com | udp |
| US | 8.8.8.8:53 | ip1.yinliu2.com | udp |
Files
memory/4888-1-0x0000000001730000-0x0000000001731000-memory.dmp
memory/4888-0-0x00000000016C0000-0x00000000016C1000-memory.dmp
memory/4888-7-0x00000000017B0000-0x00000000017B1000-memory.dmp
memory/4888-6-0x0000000000707000-0x0000000000D95000-memory.dmp
memory/4888-5-0x00000000017A0000-0x00000000017A1000-memory.dmp
memory/4888-4-0x0000000001790000-0x0000000001791000-memory.dmp
memory/4888-3-0x0000000001780000-0x0000000001781000-memory.dmp
memory/4888-2-0x0000000001740000-0x0000000001741000-memory.dmp
memory/4888-11-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-12-0x0000000003590000-0x00000000035B6000-memory.dmp
memory/4888-33-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-47-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-53-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-56-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-51-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-45-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-43-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-41-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-39-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-37-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-35-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-31-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-29-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-27-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-55-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-57-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-23-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-49-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-21-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-19-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-17-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-15-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-14-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-13-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4888-58-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-59-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-60-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-61-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-62-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-63-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-64-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-65-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-66-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-67-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-68-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-69-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-70-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-71-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-72-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-73-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-74-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-75-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-76-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-77-0x0000000000400000-0x000000000155D000-memory.dmp
memory/4888-78-0x0000000000400000-0x000000000155D000-memory.dmp