Analysis
-
max time kernel
138s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:44
Static task
static1
Behavioral task
behavioral1
Sample
setup_pstmafm44x_20220402_Beta.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
setup_pstmafm44x_20220402_Beta.exe
Resource
win10v2004-20221111-en
General
-
Target
setup_pstmafm44x_20220402_Beta.exe
-
Size
28MB
-
MD5
153d9212e049fa053d2337de207f169f
-
SHA1
8c8b0692d48c3bc8ede9f426993f283943c79537
-
SHA256
2e5f727b95527d3320a50400c48bec4208dd10f39776e667fccfc943287f27ff
-
SHA512
daa6a6e39824ded9cbc716ac2aa734c7be124fbfb1156ed03818b9d7891d7cbf7685c73f82cdf82f0812ae9f64d0f1da89523dc5060f589da04b06ef8230d6a0
-
SSDEEP
786432:iliap7IQWxhhh+3vLccvBG7yadtUlkiYno6RgzQCTyr0satP8:iliaBEhhh+3vNvBGyeGk5o6i0Ayr0sY0
Malware Config
Signatures
-
Executes dropped EXE ⋅ 4 IoCs
Processes:
setup_pstmafm44x_20220402_Beta.tmpPstmafm.exePstmafm.exeSTMAFMDSPforWindows.exepid process 1232 setup_pstmafm44x_20220402_Beta.tmp 1544 Pstmafm.exe 568 Pstmafm.exe 1324 STMAFMDSPforWindows.exe -
Registers COM server for autorun ⋅ 1 TTPs 4 IoCs
Processes:
Pstmafm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\LocalServer32\ = "C:\\CreaTec\\STMAFM20220402\\Pstmafm.exe" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\LocalServer32 Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\LocalServer32\ = "C:\\CreaTec\\STMAFM20220402\\Pstmafm.exe" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\LocalServer32 Pstmafm.exe -
Loads dropped DLL ⋅ 6 IoCs
Processes:
setup_pstmafm44x_20220402_Beta.exesetup_pstmafm44x_20220402_Beta.tmpPstmafm.exepid process 1652 setup_pstmafm44x_20220402_Beta.exe 1232 setup_pstmafm44x_20220402_Beta.tmp 1232 setup_pstmafm44x_20220402_Beta.tmp 568 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe -
Checks installed software on the system ⋅ 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
TTPs:
-
Processes:
Pstmafm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Pstmafm.exe -
Enumerates physical storage devices ⋅ 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry ⋅ 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Pstmafm.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Pstmafm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Pstmafm.exe -
Modifies registry class ⋅ 64 IoCs
Processes:
Pstmafm.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib\{FDCF968A-9B44-4A8E-9374-CC747900FCBD}\1.0\0\win32 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7} Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Pstmafm.stmafmrem\Clsid Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF}\ = "IstmafmeventEvents" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\ProgID\ = "Pstmafm.stmafmevent" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\ = "stmafmevent Object" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\ProgID Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\LocalServer32\ = "C:\\CreaTec\\STMAFM20220402\\Pstmafm.exe" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib\{FDCF968A-9B44-4A8E-9374-CC747900FCBD}\1.0\0 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\ = "Istmafmevent" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\ProxyStubClsid32 Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\TypeLib\Version = "1.0" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6} Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\TypeLib Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\LocalServer32 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Pstmafm.stmafmevent\Clsid Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Pstmafm.stmafmevent\Clsid\ = "{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\ProgID Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\TypeLib\ = "{FDCF968A-9B44-4A8E-9374-CC747900FCBD}" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF}\TypeLib\Version = "1.0" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF} Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1} Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Pstmafm.stmafmevent\ = "stmafmevent Object" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib\{FDCF968A-9B44-4A8E-9374-CC747900FCBD}\1.0\FLAGS\ = "0" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\TypeLib\Version = "1.0" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF}\TypeLib\ = "{FDCF968A-9B44-4A8E-9374-CC747900FCBD}" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF}\TypeLib Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\ = "Istmafmuser" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib\{FDCF968A-9B44-4A8E-9374-CC747900FCBD}\1.0\ = "Pstmafm Library" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\ProxyStubClsid32 Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\TypeLib\Version = "1.0" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\TypeLib\ = "{FDCF968A-9B44-4A8E-9374-CC747900FCBD}" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\TypeLib Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\TypeLib Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\ = "stmafmrem Object" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\TypeLib\ = "{FDCF968A-9B44-4A8E-9374-CC747900FCBD}" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\LocalServer32\ = "C:\\CreaTec\\STMAFM20220402\\Pstmafm.exe" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Pstmafm.stmafmrem\ = "stmafmrem Object" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\TypeLib\Version = "1.0" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\TypeLib\Version = "1.0" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF}\ProxyStubClsid32 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD} Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\ProgID\ = "Pstmafm.stmafmrem" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib\{FDCF968A-9B44-4A8E-9374-CC747900FCBD}\1.0\HELPDIR Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\ = "Istmafmrem" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\ProxyStubClsid32 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\ProxyStubClsid32 Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\Interface\{D987154C-A6AB-473D-8879-366D509BFFCF} Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\ = "Istmafmuser" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD}\TypeLib Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{D4FC24E5-12A1-490D-828B-C3A8A46A32F1}\Version\ = "1.0" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\TypeLib Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{C843CD27-38E0-4789-AF65-A6FAB0BE20B7}\ = "Istmafmrem" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6} Pstmafm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{299E6FC8-077A-4D09-ADED-0054FDAE78E6}\TypeLib\Version = "1.0" Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Interface\{9E2296E9-B122-432C-9CD1-6D3BF051F7BD} Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\Version Pstmafm.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{1D37EB7C-BF29-44DC-8138-EC1A9B212DB4}\TypeLib Pstmafm.exe -
Suspicious behavior: EnumeratesProcesses ⋅ 7 IoCs
Processes:
setup_pstmafm44x_20220402_Beta.tmpPstmafm.exePstmafm.exepid process 1232 setup_pstmafm44x_20220402_Beta.tmp 1232 setup_pstmafm44x_20220402_Beta.tmp 1544 Pstmafm.exe 1544 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe -
Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
Processes:
setup_pstmafm44x_20220402_Beta.tmppid process 1232 setup_pstmafm44x_20220402_Beta.tmp -
Suspicious use of SetWindowsHookEx ⋅ 5 IoCs
Processes:
Pstmafm.exePstmafm.exepid process 1544 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe 568 Pstmafm.exe -
Suspicious use of WriteProcessMemory ⋅ 19 IoCs
Processes:
setup_pstmafm44x_20220402_Beta.exesetup_pstmafm44x_20220402_Beta.tmpPstmafm.exedescription pid process target process PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1652 wrote to memory of 1232 1652 setup_pstmafm44x_20220402_Beta.exe setup_pstmafm44x_20220402_Beta.tmp PID 1232 wrote to memory of 1544 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 1544 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 1544 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 1544 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 568 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 568 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 568 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 1232 wrote to memory of 568 1232 setup_pstmafm44x_20220402_Beta.tmp Pstmafm.exe PID 568 wrote to memory of 1324 568 Pstmafm.exe STMAFMDSPforWindows.exe PID 568 wrote to memory of 1324 568 Pstmafm.exe STMAFMDSPforWindows.exe PID 568 wrote to memory of 1324 568 Pstmafm.exe STMAFMDSPforWindows.exe PID 568 wrote to memory of 1324 568 Pstmafm.exe STMAFMDSPforWindows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_pstmafm44x_20220402_Beta.exe"C:\Users\Admin\AppData\Local\Temp\setup_pstmafm44x_20220402_Beta.exe"Loads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-OSHT7.tmp\setup_pstmafm44x_20220402_Beta.tmp"C:\Users\Admin\AppData\Local\Temp\is-OSHT7.tmp\setup_pstmafm44x_20220402_Beta.tmp" /SL5="$70124,29710762,721408,C:\Users\Admin\AppData\Local\Temp\setup_pstmafm44x_20220402_Beta.exe"Executes dropped EXELoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of FindShellTrayWindowSuspicious use of WriteProcessMemory
-
C:\CreaTec\STMAFM20220402\Pstmafm.exe"C:\CreaTec\STMAFM20220402\Pstmafm.exe" /regserverperuserExecutes dropped EXERegisters COM server for autorunModifies registry classSuspicious behavior: EnumeratesProcessesSuspicious use of SetWindowsHookEx
-
C:\CreaTec\STMAFM20220402\Pstmafm.exe"C:\CreaTec\STMAFM20220402\Pstmafm.exe"Executes dropped EXELoads dropped DLLChecks whether UAC is enabledChecks processor information in registrySuspicious behavior: EnumeratesProcessesSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\CreaTec\STMAFM20220402\STMAFMDSPforWindows.exe"C:\CreaTec\STMAFM20220402\STMAFMDSPforWindows.exe" 51599Executes dropped EXE
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
C:\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
C:\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
C:\CreaTec\STMAFM20220402\STMAFMDSPforWindows.exeFilesize
192KB
MD5c61d77e8f0d3a97d4f7f7422d6b3a9e6
SHA1e8600b6c645b4430dcaa801cd3c9c705930e8989
SHA2561bdca23795e20381421a61a2faf4ea8c7f482c77c00d8f13fd54ad5959dba2d9
SHA5122b709bcdcfeb9dfa7705b128217ccba194cdb40ad0b37c3cecbdc323542235d3347252ee6e599b4e85561a001bd7c23168663a4f42b72b6368c316e99fd05136
-
C:\CreaTec\STMAFM20220402\stmafmdspforwindows.exeFilesize
192KB
MD5c61d77e8f0d3a97d4f7f7422d6b3a9e6
SHA1e8600b6c645b4430dcaa801cd3c9c705930e8989
SHA2561bdca23795e20381421a61a2faf4ea8c7f482c77c00d8f13fd54ad5959dba2d9
SHA5122b709bcdcfeb9dfa7705b128217ccba194cdb40ad0b37c3cecbdc323542235d3347252ee6e599b4e85561a001bd7c23168663a4f42b72b6368c316e99fd05136
-
C:\Users\Admin\AppData\Local\Temp\is-OSHT7.tmp\setup_pstmafm44x_20220402_Beta.tmpFilesize
2MB
MD58e2d270339dcd0a68fbb2f02a65d45dd
SHA1bfcdb1f71692020858f96960e432e94a4e70c4a4
SHA256506176b3245de84bb0b7a4da4b8068b9dd289eb9a3a1757d4183c7c3f168c811
SHA51231eac8aabe8ac83f24d4eba21bc3a52b56105f52402aeb00e505a6be3208cf92cc57529b26f1b29605f554dccdff51e9f28f584268bfda689f53be624f3fd647
-
C:\Users\Admin\AppData\Local\Temp\is-OSHT7.tmp\setup_pstmafm44x_20220402_Beta.tmpFilesize
2MB
MD58e2d270339dcd0a68fbb2f02a65d45dd
SHA1bfcdb1f71692020858f96960e432e94a4e70c4a4
SHA256506176b3245de84bb0b7a4da4b8068b9dd289eb9a3a1757d4183c7c3f168c811
SHA51231eac8aabe8ac83f24d4eba21bc3a52b56105f52402aeb00e505a6be3208cf92cc57529b26f1b29605f554dccdff51e9f28f584268bfda689f53be624f3fd647
-
\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
\CreaTec\STMAFM20220402\Pstmafm.exeFilesize
72MB
MD5dcb1f1435fb46fad630c8b9129147a5c
SHA1fed0fe9504b20b418d8b9e7e888e2fccd7cd1d3d
SHA2567b38c085ce079d44bef29334efad403711e2f3c23bbf189e7d7024af9ec2127e
SHA5124fe4f55d8f8cfd435fbdd5009f26918e8287a37f26b10ead24b0f8fba687e762814d72c3048ae43b47db22c13129225daf161378db990d2dfe8a4450ed4b410a
-
\CreaTec\STMAFM20220402\stmafmdspforwindows.exeFilesize
192KB
MD5c61d77e8f0d3a97d4f7f7422d6b3a9e6
SHA1e8600b6c645b4430dcaa801cd3c9c705930e8989
SHA2561bdca23795e20381421a61a2faf4ea8c7f482c77c00d8f13fd54ad5959dba2d9
SHA5122b709bcdcfeb9dfa7705b128217ccba194cdb40ad0b37c3cecbdc323542235d3347252ee6e599b4e85561a001bd7c23168663a4f42b72b6368c316e99fd05136
-
\CreaTec\STMAFM20220402\stmafmdspforwindows.exeFilesize
192KB
MD5c61d77e8f0d3a97d4f7f7422d6b3a9e6
SHA1e8600b6c645b4430dcaa801cd3c9c705930e8989
SHA2561bdca23795e20381421a61a2faf4ea8c7f482c77c00d8f13fd54ad5959dba2d9
SHA5122b709bcdcfeb9dfa7705b128217ccba194cdb40ad0b37c3cecbdc323542235d3347252ee6e599b4e85561a001bd7c23168663a4f42b72b6368c316e99fd05136
-
\Users\Admin\AppData\Local\Temp\is-OSHT7.tmp\setup_pstmafm44x_20220402_Beta.tmpFilesize
2MB
MD58e2d270339dcd0a68fbb2f02a65d45dd
SHA1bfcdb1f71692020858f96960e432e94a4e70c4a4
SHA256506176b3245de84bb0b7a4da4b8068b9dd289eb9a3a1757d4183c7c3f168c811
SHA51231eac8aabe8ac83f24d4eba21bc3a52b56105f52402aeb00e505a6be3208cf92cc57529b26f1b29605f554dccdff51e9f28f584268bfda689f53be624f3fd647
-
memory/568-70-0x0000000000000000-mapping.dmp
-
memory/1232-62-0x0000000074421000-0x0000000074423000-memory.dmpFilesize
8KB
-
memory/1232-58-0x0000000000000000-mapping.dmp
-
memory/1324-78-0x0000000000000000-mapping.dmp
-
memory/1544-65-0x0000000000000000-mapping.dmp
-
memory/1652-61-0x0000000000400000-0x00000000004BE000-memory.dmpFilesize
760KB
-
memory/1652-73-0x0000000000400000-0x00000000004BE000-memory.dmpFilesize
760KB
-
memory/1652-54-0x00000000757A1000-0x00000000757A3000-memory.dmpFilesize
8KB
-
memory/1652-55-0x0000000000400000-0x00000000004BE000-memory.dmpFilesize
760KB