Analysis

  • max time kernel
    133s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 10:46

General

  • Target

    Pkpm2007/setupapi.dll

  • Size

    536KB

  • MD5

    d4cbd86669115dacaf336ebc43c19df2

  • SHA1

    5cc42ba130a50c2c78f7db58dde19f94c0ba3dc9

  • SHA256

    6d222f3e46e9ef79a0d6041196983cb1cc3e81b3c71c0bb1c88881990c992789

  • SHA512

    94614e9873dce35becff87e4fce61b1f6ec7d88c47b5f0887df72c27ee6c94e0ac9d502890dbd3a74b4ad05eb6905870f2a29faac35a2119e36dd622106fcc2b

  • SSDEEP

    6144:7X1D3JUyvsoxBal1+ZuY/iVg+BbnyUa+z65UEaFhzXGBm0z+V:D1S4BaT+ZFiVg+1yUnOlApYm0aV

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Program crash 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Pkpm2007\setupapi.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Pkpm2007\setupapi.dll,#1
      2⤵
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 924
        3⤵
        • Program crash
        PID:2568
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3108 -ip 3108
    1⤵
      PID:2348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3108-1-0x0000000002B70000-0x0000000002BD5000-memory.dmp

      Filesize

      404KB

    • memory/3108-5-0x0000000002B70000-0x0000000002BD5000-memory.dmp

      Filesize

      404KB

    • memory/3108-8-0x0000000010000000-0x00000000100B7000-memory.dmp

      Filesize

      732KB

    • memory/3108-6-0x0000000010000000-0x00000000100B7000-memory.dmp

      Filesize

      732KB

    • memory/3108-9-0x0000000002EF0000-0x0000000002FBA000-memory.dmp

      Filesize

      808KB

    • memory/3108-10-0x0000000002FC0000-0x0000000003024000-memory.dmp

      Filesize

      400KB

    • memory/3108-15-0x0000000002FC0000-0x0000000003024000-memory.dmp

      Filesize

      400KB

    • memory/3108-19-0x0000000002FC0000-0x0000000003024000-memory.dmp

      Filesize

      400KB

    • memory/3108-18-0x0000000002EF0000-0x0000000002FBA000-memory.dmp

      Filesize

      808KB

    • memory/3108-17-0x0000000002EF0000-0x0000000002FBA000-memory.dmp

      Filesize

      808KB

    • memory/3108-16-0x0000000002EF0000-0x0000000002FBA000-memory.dmp

      Filesize

      808KB

    • memory/3108-22-0x0000000002B70000-0x0000000002BD5000-memory.dmp

      Filesize

      404KB

    • memory/3108-21-0x0000000010000000-0x00000000100B7000-memory.dmp

      Filesize

      732KB

    • memory/3108-20-0x0000000010000000-0x00000000100B7000-memory.dmp

      Filesize

      732KB

    • memory/3108-23-0x0000000002FC0000-0x0000000003024000-memory.dmp

      Filesize

      400KB

    • memory/3108-25-0x0000000010000000-0x00000000100B7000-memory.dmp

      Filesize

      732KB

    • memory/3108-26-0x0000000002EF0000-0x0000000002FBA000-memory.dmp

      Filesize

      808KB

    • memory/3108-24-0x0000000002B70000-0x0000000002BD5000-memory.dmp

      Filesize

      404KB