Analysis Overview
SHA256
a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75
Threat Level: Shows suspicious behavior
The file a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75 was found to be: Shows suspicious behavior.
Malicious Activity Summary
VMProtect packed file
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-29 14:26
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-29 14:25
Reported
2024-06-29 14:28
Platform
win7-20240508-en
Max time kernel
148s
Max time network
121s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe
"C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe"
Network
Files
memory/1252-0-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-1-0x0000000000401000-0x00000000004C5000-memory.dmp
memory/1252-2-0x00000000774B0000-0x00000000774B1000-memory.dmp
memory/1252-4-0x00000000774B0000-0x00000000774B1000-memory.dmp
memory/1252-10-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-8-0x0000000076ED0000-0x0000000076ED1000-memory.dmp
memory/1252-12-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-13-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-14-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-15-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-16-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-17-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-18-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-19-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-20-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-21-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-22-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-23-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-24-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-25-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-26-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-27-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-28-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/1252-29-0x0000000000400000-0x0000000000FFC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-29 14:25
Reported
2024-06-29 14:28
Platform
win10v2004-20240508-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe
"C:\Users\Admin\AppData\Local\Temp\a4e2e3caa248fe4fd24758d04efb40d5161a5507ff847638d1967f4883459b75.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/3672-0-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-1-0x0000000000401000-0x00000000004C5000-memory.dmp
memory/3672-2-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-4-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-5-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-8-0x0000000003B70000-0x0000000003BEE000-memory.dmp
memory/3672-7-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-9-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-10-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-11-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-13-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-15-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-17-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-19-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-21-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-23-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-25-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-27-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-29-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-31-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-33-0x0000000000400000-0x0000000000FFC000-memory.dmp
memory/3672-35-0x0000000000400000-0x0000000000FFC000-memory.dmp