Analysis

  • max time kernel
    148s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 05:52

General

  • Target

    PowerDataRecovery/Power Data Recovery 7.0.exe

  • Size

    6.3MB

  • MD5

    fe58ab0c63d815dbfd496cacf4a0fe5d

  • SHA1

    c7fdba5b13fe2f37ae45150a387107c4deaebda8

  • SHA256

    b3601787b0b0becb17eb053d5fa1a7b31254eac3766c4ea1c15e9c8d23103d88

  • SHA512

    7bbc83169a2cb8b5a3019a21071b94b5dd53863cac63b3b94f99b6b30a000d4f935f346ab542cb2b5a8fd2257d440f48f1cc2a537b70f883a6577ecffa557fc2

  • SSDEEP

    98304:MhmFEaNmOHDqI4Ue1CNNRrZDK6KxkvtmkJuwLmBBRuqEYcRQ:MhmVmQHw1CDRrBmmu2ereQ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 5 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PowerDataRecovery\Power Data Recovery 7.0.exe
    "C:\Users\Admin\AppData\Local\Temp\PowerDataRecovery\Power Data Recovery 7.0.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Users\Admin\AppData\Local\Temp\PowerDataRecovery\PowerDataRecovery.dll
      PowerDataRecovery.dll
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4800
    • C:\Windows\SysWOW64\Regedit.exe
      Regedit /S "C:\Program Files\Common Files\1.reg"
      2⤵
      • Runs .reg file with regedit
      PID:532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\1.reg

    Filesize

    572B

    MD5

    c9b4490d460248f90b8fd3f9c9ce700c

    SHA1

    260b69c807c6cc310e94080cf79ccff5edbb924d

    SHA256

    691cf9d85d7176242622abc71a6739fa3aeb24eb849bb0f600d745ad90c61d1e

    SHA512

    ded1c69624a4abc0cef953dd2fc4317fcfeb1b4ae61b6c38cf183c73ff9ddfbc4a283766596e19e5a87ba8f0ffe97a288923e60f4f2c0292204abf732f486a8c

  • memory/532-147-0x0000000000000000-mapping.dmp

  • memory/3500-133-0x00000000063A0000-0x00000000064ED000-memory.dmp

    Filesize

    1.3MB

  • memory/3500-139-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-140-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-141-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-142-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-143-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-144-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-145-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/3500-149-0x0000000000400000-0x000000000451B000-memory.dmp

    Filesize

    65.1MB

  • memory/4800-146-0x0000000000000000-mapping.dmp