Analysis

  • max time kernel
    32s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2023 22:56

General

  • Target

    BruteForcers PACK/BruteForcers PACK/PSN-brutechecker-by-Bax77 pcrt/psn/PCRET.exe

  • Size

    5.9MB

  • MD5

    5795a6711b14701420290004614b5057

  • SHA1

    793720dc52d6f111497b8c0c8a494e4568d7a0a0

  • SHA256

    eb6891a9df2da4a5cea28fd715876891907c24e94dd5a2e88ee19e511ff3300b

  • SHA512

    c26d3ec35597439282a22351ebaa703623189118682e578375ef2f4f8240bf642a4df8c593c79a89dd1b6a611acae9af820cac5d484ce1f8f713b1185d025739

  • SSDEEP

    98304:p1UAeuf51R6tdOntp4IDqqxlxgoLXdBUHMxZ3DOLdNolvMhl1owO7fylaWBAKUho:rPxbQdwBDqqPRlzeulvYewY9vh4F

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\PSN-brutechecker-by-Bax77 pcrt\psn\PCRET.exe
    "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\PSN-brutechecker-by-Bax77 pcrt\psn\PCRET.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-133-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-134-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-135-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-136-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-137-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-138-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB

  • memory/1512-139-0x0000000003950000-0x000000000398D000-memory.dmp

    Filesize

    244KB

  • memory/1512-141-0x0000000000400000-0x0000000000D8D000-memory.dmp

    Filesize

    9.6MB

  • memory/1512-142-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB