Analysis
-
max time kernel
1798s -
max time network
1801s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/04/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
pandora ahhah.exe
Resource
win11-20240412-en
General
-
Target
pandora ahhah.exe
-
Size
11.0MB
-
MD5
d3a8ab19805f4f661739397f18eff7ca
-
SHA1
831c7c6f11c2ddceaeaa89463412be5c81707dff
-
SHA256
6c9908c37d0419f8a19a2ce5055d255ecd9663d3b59957d99072fa18c1f9e547
-
SHA512
73032608a4021a766b53f60af7e6cbd5b9989a5edeeb2abbfad5293acd074fba4d2607f78a4280c3ce5fcedde660caf93efaf872a4d7e9b5eed25f3a4bac90d2
-
SSDEEP
24576:iZApS04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGfS2xIbt+rH:iZAL4auS+UjfU2T/5XDFxIbt+r
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3188 WindowsInput.exe 3828 AudioDriver.exe -
Loads dropped DLL 1 IoCs
pid Process 3828 AudioDriver.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe pandora ahhah.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe 3828 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3828 AudioDriver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3828 AudioDriver.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4676 wrote to memory of 3188 4676 pandora ahhah.exe 81 PID 4676 wrote to memory of 3188 4676 pandora ahhah.exe 81 PID 4676 wrote to memory of 3828 4676 pandora ahhah.exe 82 PID 4676 wrote to memory of 3828 4676 pandora ahhah.exe 82 PID 4676 wrote to memory of 3828 4676 pandora ahhah.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\pandora ahhah.exe"C:\Users\Admin\AppData\Local\Temp\pandora ahhah.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3188
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
626KB
MD5d8aec01ff14e3e7ad43a4b71e30482e4
SHA1e3015f56f17d845ec7eef11d41bbbc28cc16d096
SHA256da1d608be064555ab3d3d35e6db64527b8c44f3fa5ddd7c3ec723f80fc99736e
SHA512f5b2f4bda0cc13e1d1c541fb0caea14081ee4daffd497e31a3d4d55d5f9d85a61158b4891a6527efe623b2f32b697ac912320d9be5c0303812ca98dcc8866fcf
-
Filesize
11.0MB
MD5d3a8ab19805f4f661739397f18eff7ca
SHA1831c7c6f11c2ddceaeaa89463412be5c81707dff
SHA2566c9908c37d0419f8a19a2ce5055d255ecd9663d3b59957d99072fa18c1f9e547
SHA51273032608a4021a766b53f60af7e6cbd5b9989a5edeeb2abbfad5293acd074fba4d2607f78a4280c3ce5fcedde660caf93efaf872a4d7e9b5eed25f3a4bac90d2
-
Filesize
21KB
MD5e854a4636afc652b320e12e50ba4080e
SHA18a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA25694b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA51230aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118