Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 05:05

General

  • Target

    8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe

  • Size

    62KB

  • MD5

    098d7791585a73213b2509a522f1a800

  • SHA1

    c8ee8924e95da74919e503462d041c8dd2fce82f

  • SHA256

    8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5

  • SHA512

    091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65

  • SSDEEP

    768:64lzcg6Li/wNDB80a9Uyjw+fyseO+PCV/pPxedeVpy4lzcn:64Bc5iOY84+6VCUy4Bcn

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe
    "C:\Users\Admin\AppData\Local\Temp\8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\WINDOWS\SysWOW64\PFMNTNG.EXE
      "C:\WINDOWS\SYSTEM32\PFMNTNG.EXE" C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\8334CC849375E9B6B337638EAD8F70CA1138855ABE839DA8B59A2C94115CA0D5.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\WINDOWS\SysWOW64\PFMNTNG.EXE
        "C:\WINDOWS\SYSTEM32\PFMNTNG.EXE" C:\WINDOWS\SYSWOW64\PFMNTNG.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\SysWOW64\PFMNTNG.EXE

    Filesize

    62KB

    MD5

    098d7791585a73213b2509a522f1a800

    SHA1

    c8ee8924e95da74919e503462d041c8dd2fce82f

    SHA256

    8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5

    SHA512

    091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65

  • C:\Windows\SysWOW64\PFMNTNG.EXE

    Filesize

    62KB

    MD5

    098d7791585a73213b2509a522f1a800

    SHA1

    c8ee8924e95da74919e503462d041c8dd2fce82f

    SHA256

    8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5

    SHA512

    091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65

  • C:\Windows\SysWOW64\PFMNTNG.EXE

    Filesize

    62KB

    MD5

    098d7791585a73213b2509a522f1a800

    SHA1

    c8ee8924e95da74919e503462d041c8dd2fce82f

    SHA256

    8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5

    SHA512

    091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65

  • memory/3976-144-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4248-146-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4460-134-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4460-145-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB