Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 23:02

General

  • Target

    processhacker-2.39-setup.exe

  • Size

    2.2MB

  • MD5

    54daad58cce5003bee58b28a4f465f49

  • SHA1

    162b08b0b11827cc024e6b2eed5887ec86339baa

  • SHA256

    28042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063

  • SHA512

    8330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829

  • SSDEEP

    49152:l9hfV/U5NkLXXzGZjt6kFTCVP6hWE0wvmk/eE+FrAl+NGsOSE6IX8pq:Dh9/ULkjKxtTGP6VZd2rAcvOSE6Nq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\processhacker-2.39-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\processhacker-2.39-setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\is-BN9OA.tmp\processhacker-2.39-setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BN9OA.tmp\processhacker-2.39-setup.tmp" /SL5="$80172,1874675,150016,C:\Users\Admin\AppData\Local\Temp\processhacker-2.39-setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Program Files\Process Hacker 2\ProcessHacker.exe
        "C:\Program Files\Process Hacker 2\ProcessHacker.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1480
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Process Hacker 2\ProcessHacker.exe

      Filesize

      1.6MB

      MD5

      b365af317ae730a67c936f21432b9c71

      SHA1

      a0bdfac3ce1880b32ff9b696458327ce352e3b1d

      SHA256

      bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4

      SHA512

      cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b

    • C:\Program Files\Process Hacker 2\ProcessHacker.sig

      Filesize

      64B

      MD5

      2ccb4420d40893846e1f88a2e82834da

      SHA1

      ef29efec7e3e0616948f9fe1fd016e43b6c971de

      SHA256

      519c2c2ca0caf00db5b3eb2b79dfe42e6128161c13aeb4b4d8b86fbffc67e3d4

      SHA512

      b2a000b33d4a9b2e886208fc78aeb3a986f7bd379fb6910da9f6577603aa6e8237cb552eabca70445f37b427419beeff0b061090cb952331b8db322ce2e58bc6

    • C:\Program Files\Process Hacker 2\plugins\DotNetTools.dll

      Filesize

      132KB

      MD5

      b16ce8ba8e7f0ee83ec1d49f2d0af0a7

      SHA1

      cdf17a7beb537853fae6214d028754ce98e2e860

      SHA256

      b4cc0280e2caa0335361172cb7d673f745defc78299ded808426ffbc2458e4d9

      SHA512

      32de59c95d1690f4221b236376e282c8be1bb7f5d567592b935dcd798b36b80e86da81741c5845fa280386f75f6eafc9bbd41035362984150b134d24aede61eb

    • C:\Program Files\Process Hacker 2\plugins\ExtendedNotifications.dll

      Filesize

      140KB

      MD5

      be4dc4d2d1d05001ab0bb2bb8659bfad

      SHA1

      c0ed9e375b447b61c07c0b00c93bb81c87bcfc2e

      SHA256

      61e8cd8de80a5c0d7ced280fe04ad8387a846a7bf2ee51bcbba96b971c7c1795

      SHA512

      31389e268fe3bf1175fa3c251ca026f77dc59361b8425c9826f31d18c5174e6de68c6092aef187f2bd2c92d89b3093a660b2fe6189af369293c1117c856b5cdf

    • C:\Program Files\Process Hacker 2\plugins\ExtendedServices.dll

      Filesize

      136KB

      MD5

      4858bdb7731bf0b46b247a1f01f4a282

      SHA1

      de2f9cbcec1e1fa891d9693fb3cadfdd4cfe1f60

      SHA256

      5ae7c0972fd4e4c4ae14c0103602ca854377fefcbccd86fa68cfc5a6d1f99f60

      SHA512

      41b39560e15d620733ca29dc37f55a939a653f99686ac86643ccc67fbb807ad95d1996b867319d98506f3b8a30772fff3c3317bbcc205987f48031923f674d9a

    • C:\Program Files\Process Hacker 2\plugins\ExtendedTools.dll

      Filesize

      196KB

      MD5

      bc61e6fb02fbbfe16fb43cc9f4e949f1

      SHA1

      307543fcef62c6f8c037e197703446fcb543424a

      SHA256

      f2805e0f81513641a440f1a21057a664961c22192cb33fca3870362c8f872d87

      SHA512

      0bbfe53e1dd933a3080d9775ad890fcbd73f9820885efa6b69e9664261249f34eaae3870f74de8511734fc9a0114f36e1bfc529a032d303a8e3e583e37a506c6

    • C:\Program Files\Process Hacker 2\plugins\HardwareDevices.dll

      Filesize

      180KB

      MD5

      a46c8bb886e0b9290e5dbc6ca524d61f

      SHA1

      cfc1b93dc894b27477fc760dfcfb944cb849cb48

      SHA256

      acd49f2aa36d4efb9c4949e2d3cc2bd7aee384c2ced7aa9e66063da4150fcb00

      SHA512

      5a4d2e0fa7a1a14bc4c94a0c144bfbfcef1ecabe4dc15f668605d27f37f531934778f53e7377bab0ff83531732dc15e9fc40b16f2d1f7e925429681bd5bdca73

    • C:\Program Files\Process Hacker 2\plugins\NetworkTools.dll

      Filesize

      134KB

      MD5

      d6bed1d6fdbed480e32fdd2dd4c13352

      SHA1

      544567d030a19e779629eed65d2334827dcda141

      SHA256

      476aa6af14dd0b268786e32543b9a6917a298d4d90e1015dac6fb2b522cf5d2e

      SHA512

      89362a7b675651f44649f0ea231f039e0b91aba9f84c91545f15e187c6cbd07bbf3648a4e232dfe5122cf5636e67c458f4f7dab49ed4de3f3a303aa396c41d1c

    • C:\Program Files\Process Hacker 2\plugins\OnlineChecks.dll

      Filesize

      222KB

      MD5

      12c25fb356e51c3fd81d2d422a66be89

      SHA1

      7cc763f8dc889a4ec463aaba38f6e6f65dbdbb8c

      SHA256

      7336d66588bbcfea63351a2eb7c8d83bbd49b5d959ba56a94b1fe2e905a5b5de

      SHA512

      927d785d03c1ee44b5e784b35a09168978b652f37fb73a1a2eeecd3583c28595fb030e8c1f87ab9a20beac4622775777820d1a2ad7219ba8b9ae8b6fbc4568a0

    • C:\Program Files\Process Hacker 2\plugins\SbieSupport.dll

      Filesize

      95KB

      MD5

      37cbfa73883e7e361d3fa67c16d0f003

      SHA1

      ffa24756cdc37dfd24dc97ba7a42d0399e59960a

      SHA256

      57c56f7b312dc1f759e6ad039aac3f36ce5130d259eb9faad77239083398308b

      SHA512

      6e0bfab9ff44f580f302cabd06fc537a9e24432effd94b50ab696b35f57a61772072b7f9045a9e99fa4bf3bc316f43ea25ab6c87517242e7957eb86575203bed

    • C:\Program Files\Process Hacker 2\plugins\ToolStatus.dll

      Filesize

      243KB

      MD5

      3788efff135f8b17a179d02334d505e6

      SHA1

      d6c965ba09b626d7d157372756ea1ec52a43f6b7

      SHA256

      5713d40dec146dbc819230daefe1b886fa6d6f6dbd619301bb8899562195cbab

      SHA512

      215d6c3665323901d41ae5151908c4e084a04a1558617016f0788194304e066410b92943bd6c119339727037ee02cfda893b9baf5603b2870d9fc5ae0c77ca7e

    • C:\Program Files\Process Hacker 2\plugins\Updater.dll

      Filesize

      110KB

      MD5

      6976b57c6391f54dbd2828a45ca81100

      SHA1

      a8c312a56ede6f4852c34c316c01080762aa5498

      SHA256

      0c11cdc3765ffb53ba9707b6f99ec17ae4f7334578a935ba7bcbbc9c7bdeed2e

      SHA512

      54d8b39457f516d921bb907615ff60a46b6031e1444a443c9657e06d78c9fb0f637ae4756bb7b884e4dca2f55902372ad4ddba1d020abe02e0a381702ae270cc

    • C:\Program Files\Process Hacker 2\plugins\UserNotes.dll

      Filesize

      114KB

      MD5

      e48c789c425f966f5e5ee3187934174f

      SHA1

      96f85a86a56cbf55ebd547039eb1f8b0db9d9d8d

      SHA256

      fc9d0d0482c63ab7f238bc157c3c0fed97951ccf2d2e45be45c06c426c72cb52

      SHA512

      efdb42e4a1993ee6aa5c0c525bd58316d6c92fbc5cebbc3a66a26e2cf0c69fe68d19bc9313656ad1d38c4aef33131924684e226f88ef920e0e2cd607054a857c

    • C:\Program Files\Process Hacker 2\plugins\WindowExplorer.dll

      Filesize

      133KB

      MD5

      0e8d04159c075f0048b89270d22d2dbb

      SHA1

      d0fa2367d329909b6c9efcb3cc2c2902d8cf9b22

      SHA256

      282696487ea5dc781788d5d8477b977f72b7c70f201c2af0cfe7e1a9fd8d749a

      SHA512

      56440f3feddc124574debfe3789e14d908982d4d8e9516f42fab7db7bcecdd3badd2f75e005016a7b9d87a00d5646b8df722bae8fba3932198babbe5335cf197

    • C:\Users\Admin\AppData\Local\Temp\is-BN9OA.tmp\processhacker-2.39-setup.tmp

      Filesize

      785KB

      MD5

      1c96ed29e0136825e06f037bf10b2419

      SHA1

      b74a55279474253639bebf9c92f10f947145ff30

      SHA256

      b10cf8cdf541ca0dd6df79e66fb4b0854dcac717aba034ba0c4961bff92fd021

      SHA512

      0e74854d9de4e3944b2cff9b5de7eb19fdec1fee6c9576cae6cd81741adf84eac421cb743b1df30183f645ffe849357b6a85b5be8d7f6e2efe289bbe4573e177

    • memory/216-2-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/216-0-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/216-133-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/216-11-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/4008-14-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-100-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-16-0x0000000000680000-0x0000000000681000-memory.dmp

      Filesize

      4KB

    • memory/4008-23-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-31-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-12-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-33-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-131-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/4008-6-0x0000000000680000-0x0000000000681000-memory.dmp

      Filesize

      4KB