Analysis

  • max time kernel
    130s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 05:39

General

  • Target

    registrator.exe

  • Size

    7.9MB

  • MD5

    21d6446dd4d7e7272a6f5b8584f04d9c

  • SHA1

    0fb47617d04185c16a6255ab0e0243a79076352f

  • SHA256

    7d369b6cc5baecdaea6b0553a4d992ab70605cf1e599f0b07d4acc225ec15a78

  • SHA512

    ff3724ff1f1234a2b75b636a4894090b27c10fa950ce3f64947dc13ec0a359b9d4b5c827e661af00d281d9a1155f8d38b49ddb35cab80e033f4e5263c1c7fdc5

  • SSDEEP

    196608:7jBEuQ0TicTvyvXVzsjrJ0vsk6a4dq7F:7WuQKicT2XoJ0UeX

Score
10/10

Malware Config

Signatures

  • Detected Ploutus loader 1 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\registrator.exe
    "C:\Users\Admin\AppData\Local\Temp\registrator.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4588-0-0x00007FFF756B3000-0x00007FFF756B5000-memory.dmp

    Filesize

    8KB

  • memory/4588-1-0x000001FC76E10000-0x000001FC77606000-memory.dmp

    Filesize

    8.0MB

  • memory/4588-2-0x000001FC79BE0000-0x000001FC7AEA6000-memory.dmp

    Filesize

    18.8MB

  • memory/4588-3-0x00007FFF756B0000-0x00007FFF76171000-memory.dmp

    Filesize

    10.8MB

  • memory/4588-4-0x000001FC79360000-0x000001FC793A0000-memory.dmp

    Filesize

    256KB

  • memory/4588-5-0x000001FC7BE00000-0x000001FC7BF12000-memory.dmp

    Filesize

    1.1MB

  • memory/4588-6-0x000001FC7BF10000-0x000001FC7BFB4000-memory.dmp

    Filesize

    656KB

  • memory/4588-7-0x000001FC792C0000-0x000001FC792C8000-memory.dmp

    Filesize

    32KB

  • memory/4588-8-0x000001FC7C0F0000-0x000001FC7C128000-memory.dmp

    Filesize

    224KB

  • memory/4588-9-0x000001FC792D0000-0x000001FC792DE000-memory.dmp

    Filesize

    56KB

  • memory/4588-10-0x000001FC7C130000-0x000001FC7C1CA000-memory.dmp

    Filesize

    616KB

  • memory/4588-11-0x000001FC7C3D0000-0x000001FC7C42C000-memory.dmp

    Filesize

    368KB

  • memory/4588-12-0x000001FC7C530000-0x000001FC7C5A8000-memory.dmp

    Filesize

    480KB

  • memory/4588-13-0x000001FC7C5B0000-0x000001FC7C5CC000-memory.dmp

    Filesize

    112KB

  • memory/4588-14-0x00007FFF756B0000-0x00007FFF76171000-memory.dmp

    Filesize

    10.8MB

  • memory/4588-15-0x00007FFF756B3000-0x00007FFF756B5000-memory.dmp

    Filesize

    8KB

  • memory/4588-16-0x00007FFF756B0000-0x00007FFF76171000-memory.dmp

    Filesize

    10.8MB

  • memory/4588-17-0x00007FFF756B0000-0x00007FFF76171000-memory.dmp

    Filesize

    10.8MB