Analysis

  • max time kernel
    1799s
  • max time network
    1486s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 15:36

General

  • Target

    x86/ProcessHacker.exe

  • Size

    1.4MB

  • MD5

    68f9b52895f4d34e74112f3129b3b00d

  • SHA1

    c5e2018bf7c0f314fed4fd7fe7e69fa2e648359e

  • SHA256

    d4a0fe56316a2c45b9ba9ac1005363309a3edc7acf9e4df64d326a0ff273e80f

  • SHA512

    1cd875f9d0301b14645ea608fe61560a229ee395fa061f32675c3d84e41916998f887278d8497a5e875be22ba8fcbcfcbd878a5e2ed1746dc75430b7aed5fede

  • SSDEEP

    24576:fsmjNvgp+pxECAucO9iWFT0z7rLuUhFP3MGX:PFgpAiIiWdzUz35X

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x86\ProcessHacker.exe
    "C:\Users\Admin\AppData\Local\Temp\x86\ProcessHacker.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:568
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4468
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      5673e26152c91309372aa38acfe6c763

      SHA1

      c406a4c1092e88220a74cc55bed179d5f7a32735

      SHA256

      2025876cea973165dab4a816544185c25c08bd540523d78dfdd379f96ed6bcd3

      SHA512

      2d6328bb217f7592685827e31737641d828292105e4f2a79bd8d6ba3dd95eadad8112614262ebc024be7f53ac7af9a4a5e8c571dc550955d327949b5ffc3f7f5

    • memory/4296-40-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-33-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-42-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-34-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-35-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-36-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-37-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-38-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-43-0x000001740B2C0000-0x000001740B2C1000-memory.dmp

      Filesize

      4KB

    • memory/4296-0-0x0000017402F80000-0x0000017402F90000-memory.dmp

      Filesize

      64KB

    • memory/4296-68-0x000001740B510000-0x000001740B511000-memory.dmp

      Filesize

      4KB

    • memory/4296-32-0x000001740B670000-0x000001740B671000-memory.dmp

      Filesize

      4KB

    • memory/4296-39-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB

    • memory/4296-44-0x000001740B2B0000-0x000001740B2B1000-memory.dmp

      Filesize

      4KB

    • memory/4296-46-0x000001740B2C0000-0x000001740B2C1000-memory.dmp

      Filesize

      4KB

    • memory/4296-49-0x000001740B2B0000-0x000001740B2B1000-memory.dmp

      Filesize

      4KB

    • memory/4296-52-0x000001740B1F0000-0x000001740B1F1000-memory.dmp

      Filesize

      4KB

    • memory/4296-16-0x0000017403080000-0x0000017403090000-memory.dmp

      Filesize

      64KB

    • memory/4296-64-0x000001740B3F0000-0x000001740B3F1000-memory.dmp

      Filesize

      4KB

    • memory/4296-66-0x000001740B400000-0x000001740B401000-memory.dmp

      Filesize

      4KB

    • memory/4296-67-0x000001740B400000-0x000001740B401000-memory.dmp

      Filesize

      4KB

    • memory/4296-41-0x000001740B6A0000-0x000001740B6A1000-memory.dmp

      Filesize

      4KB