Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe
Resource
win10v2004-20220812-en
General
-
Target
8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe
-
Size
62KB
-
MD5
098d7791585a73213b2509a522f1a800
-
SHA1
c8ee8924e95da74919e503462d041c8dd2fce82f
-
SHA256
8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5
-
SHA512
091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65
-
SSDEEP
768:64lzcg6Li/wNDB80a9Uyjw+fyseO+PCV/pPxedeVpy4lzcn:64Bc5iOY84+6VCUy4Bcn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4248 PFMNTNG.EXE 3976 PFMNTNG.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pfmntng = "C:\\WINDOWS\\SYSTEM32\\PFMNTNG.EXE" 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\PFMNTNG.EXE 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe File created C:\WINDOWS\SysWOW64\PFMNTNG.EXE 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe File opened for modification C:\WINDOWS\SysWOW64\PFMNTNG.EXE PFMNTNG.EXE File created C:\WINDOWS\SysWOW64\PFMNTNG.EXE PFMNTNG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4460 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe 4248 PFMNTNG.EXE 3976 PFMNTNG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4248 4460 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe 79 PID 4460 wrote to memory of 4248 4460 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe 79 PID 4460 wrote to memory of 4248 4460 8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe 79 PID 4248 wrote to memory of 3976 4248 PFMNTNG.EXE 80 PID 4248 wrote to memory of 3976 4248 PFMNTNG.EXE 80 PID 4248 wrote to memory of 3976 4248 PFMNTNG.EXE 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe"C:\Users\Admin\AppData\Local\Temp\8334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\WINDOWS\SysWOW64\PFMNTNG.EXE"C:\WINDOWS\SYSTEM32\PFMNTNG.EXE" C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\8334CC849375E9B6B337638EAD8F70CA1138855ABE839DA8B59A2C94115CA0D5.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\WINDOWS\SysWOW64\PFMNTNG.EXE"C:\WINDOWS\SYSTEM32\PFMNTNG.EXE" C:\WINDOWS\SYSWOW64\PFMNTNG.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5098d7791585a73213b2509a522f1a800
SHA1c8ee8924e95da74919e503462d041c8dd2fce82f
SHA2568334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5
SHA512091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65
-
Filesize
62KB
MD5098d7791585a73213b2509a522f1a800
SHA1c8ee8924e95da74919e503462d041c8dd2fce82f
SHA2568334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5
SHA512091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65
-
Filesize
62KB
MD5098d7791585a73213b2509a522f1a800
SHA1c8ee8924e95da74919e503462d041c8dd2fce82f
SHA2568334cc849375e9b6b337638ead8f70ca1138855abe839da8b59a2c94115ca0d5
SHA512091964a8846e62a1f46668f5f5b9d2006eba8d1ae52836f2a821d583fa3cd6ac9c23bffb447e0b772bb1c75c5500e99485a6084f0a1c1ec41875311445719d65