Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2023, 15:42

General

  • Target

    pcstory/pcstory.exe

  • Size

    27.4MB

  • MD5

    82c25a0a74d083a20a6a4c0f2cd29638

  • SHA1

    833f91973b228f376203270c733c8902be3d38d8

  • SHA256

    7d01d270c1b6ea127648e1219d8bc1864fae51a411d6b820fd57f559411f3d13

  • SHA512

    c37d74f534f0d224467b6250e13f3cd8e36f56e7e303fb9380188bc74f5315aaa02bdce24996c639afb8da04908880c0fdb4729c87ba64b110819938078ab19d

  • SSDEEP

    196608:R+9rUtY2V6yuixJ+ChoaB9+B97+V6+lFLOyomFHKnP:R+J2zNxJ3B9G7WF

Score
7/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 7 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pcstory\pcstory.exe
    "C:\Users\Admin\AppData\Local\Temp\pcstory\pcstory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe
      "C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe" -RegServer
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:936
    • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe
      "C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe" -Service
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4944
  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe
    "C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\fp2psrv.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\conf\vnet.ini

    Filesize

    55B

    MD5

    6b8a2424526f4439064205defd409d10

    SHA1

    10ba7c37d1f038f6a10e2785095a6f651f36549d

    SHA256

    c6fa1a0c9d2dc40677aa913787871bb2c18776b8149d024a3d1baa6c0c5af8d6

    SHA512

    bd4fa2a5e61cd7e8e4af27d32d79255ddcd924cfcdb69f05e352f512da7ee02828212d40ffacb84a09afcd1de5498893b7857facaeb0c31952b4cf8fa65dbcf3

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\temp\vnet.log

    Filesize

    1KB

    MD5

    345fbf9a9bfc58efbacce2711f0d8fce

    SHA1

    b11829b2e3b9ae6606b524ba48ae6fd45b47b52f

    SHA256

    48d1591499a8ae60ee78f953206e5704418a5c469cd6d6e8398614baafb66191

    SHA512

    c1ddd1a336d9884a2a369315e667230a14572c4c2880df0a66044e1270a8247b8ada68ad91b5633288117442fc220c8ab8f547305468a58a06917102fcddf04d

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\temp\vnet.log

    Filesize

    2KB

    MD5

    accd1ca5d44800f61cea12a1bafdc920

    SHA1

    258c9bb3ac156ea5da3725f0633c229c45e86a6e

    SHA256

    0eca5b26e6d821cc93bf815686bb012d40ec8fed87ad05e480f95b2f25d1e503

    SHA512

    f61828322a1f3ef5787edaa9cf3033fefb0e68d89850a1eb67cd837c784770aade2c6d8c439a2a1dd7e04340ee8119d8be87995d65d95b33b883804338aeb8a8

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\temp\vnet.log

    Filesize

    2KB

    MD5

    accd1ca5d44800f61cea12a1bafdc920

    SHA1

    258c9bb3ac156ea5da3725f0633c229c45e86a6e

    SHA256

    0eca5b26e6d821cc93bf815686bb012d40ec8fed87ad05e480f95b2f25d1e503

    SHA512

    f61828322a1f3ef5787edaa9cf3033fefb0e68d89850a1eb67cd837c784770aade2c6d8c439a2a1dd7e04340ee8119d8be87995d65d95b33b883804338aeb8a8

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\temp\vnet.log

    Filesize

    643B

    MD5

    f3553feb1cbc5848d174b0fff0f81907

    SHA1

    743a6f71ad423fd4831d23a526ddc421af7d80c2

    SHA256

    b1f4470590920383e3c1c0daed75ced10964fad22cd71debb7d6c72edd79f2a5

    SHA512

    cae5f395620ac95e694c6e0f2cf6ac1fb90d632f140d8afb53ef03d6247880fcf5225e991b5d9ffc72aaa576e8e4c0b8bdfaa918d17fbb33bfec37622fc25987

  • C:\Users\Admin\AppData\Local\Temp\pcstory\storyservice\appdata\temp\vnet.log

    Filesize

    2KB

    MD5

    c299c32129d4a93898d2e8c41e3debef

    SHA1

    096be4eea3b38bc7fb4405d529ff3a74ad02729b

    SHA256

    0e63d6b3e025100d45dd148d378176eb58338b839e14401992a209cd10b89d39

    SHA512

    86b87797926832e1ab81859d3275d375d6806b02cfa01bf4a9306b614d54c3ee19cd50084a3b0ac9acee78b93fb9e246b7e518b6bcb19d48a590b5f3281b1ab0

  • memory/2160-0-0x00007FF6E6CF0000-0x00007FF6E90FB000-memory.dmp

    Filesize

    36.0MB

  • memory/2160-64-0x00007FF6E6CF0000-0x00007FF6E90FB000-memory.dmp

    Filesize

    36.0MB