Overview
overview
3Static
static
1x64/ProcessHacker.exe
windows10-2004-x64
1x64/ProcessHacker.sig
windows10-2004-x64
3x64/kproce...er.sys
windows10-2004-x64
1x64/peview.exe
windows10-2004-x64
3x64/plugin...ls.dll
windows10-2004-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/plugin...es.dll
windows10-2004-x64
1x64/plugin...ls.dll
windows10-2004-x64
1x64/plugin...es.dll
windows10-2004-x64
1x64/plugin...ls.dll
windows10-2004-x64
1x64/plugin...ks.dll
windows10-2004-x64
1x64/plugin...rt.dll
windows10-2004-x64
1x64/plugin...us.dll
windows10-2004-x64
1x64/plugin...er.dll
windows10-2004-x64
1x64/plugin...es.dll
windows10-2004-x64
1x64/plugin...er.dll
windows10-2004-x64
1x86/ProcessHacker.exe
windows10-2004-x64
1x86/ProcessHacker.sig
windows10-2004-x64
3x86/kproce...er.sys
windows10-2004-x64
1x86/peview.exe
windows10-2004-x64
3x86/plugin...ls.dll
windows10-2004-x64
1x86/plugin...ns.dll
windows10-2004-x64
1x86/plugin...es.dll
windows10-2004-x64
1x86/plugin...ls.dll
windows10-2004-x64
1x86/plugin...es.dll
windows10-2004-x64
1x86/plugin...ls.dll
windows10-2004-x64
1x86/plugin...ks.dll
windows10-2004-x64
1x86/plugin...rt.dll
windows10-2004-x64
1x86/plugin...us.dll
windows10-2004-x64
1x86/plugin...er.dll
windows10-2004-x64
1x86/plugin...es.dll
windows10-2004-x64
1x86/plugin...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
1515s -
max time network
1563s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
x64/ProcessHacker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
x64/ProcessHacker.sig
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
x64/kprocesshacker.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
x64/peview.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
x64/plugins/DotNetTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
x64/plugins/ExtendedNotifications.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
x64/plugins/ExtendedServices.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
x64/plugins/ExtendedTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
x64/plugins/HardwareDevices.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral10
Sample
x64/plugins/NetworkTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
x64/plugins/OnlineChecks.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
x64/plugins/SbieSupport.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
x64/plugins/ToolStatus.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
x64/plugins/Updater.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
x64/plugins/UserNotes.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
x64/plugins/WindowExplorer.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
x86/ProcessHacker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
x86/ProcessHacker.sig
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
x86/kprocesshacker.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
x86/peview.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
x86/plugins/DotNetTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
x86/plugins/ExtendedNotifications.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
x86/plugins/ExtendedServices.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
x86/plugins/ExtendedTools.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
x86/plugins/HardwareDevices.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
x86/plugins/NetworkTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
x86/plugins/OnlineChecks.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
x86/plugins/SbieSupport.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
x86/plugins/ToolStatus.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
x86/plugins/Updater.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
x86/plugins/UserNotes.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
x86/plugins/WindowExplorer.dll
Resource
win10v2004-20231215-en
General
-
Target
x86/ProcessHacker.sig
-
Size
64B
-
MD5
98208b7641de5bd8dc9b524fe87a3c5f
-
SHA1
0e71eecf6a1b1a42d97c7db74d8be3a1b2c6a813
-
SHA256
35db042e16c8a39c8289660adc8cc493a800e392227d83380931dc28705af86e
-
SHA512
9adf5bad255d52e44df41d618d46cce1cb80fcb06f23e5428bf8c236b2ffc5ddbc8790141d25a5cc87af3086deb51b937b3c13841a6a6c377d32065db76bf529
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3056 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\x86\ProcessHacker.sig1⤵
- Modifies registry class
PID:3512
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2216
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3056