Analysis

  • max time kernel
    27s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 00:21

General

  • Target

    DonnyhubPremium.exe

  • Size

    722KB

  • MD5

    34e3ccf886e1321131be0ea9e28d16ac

  • SHA1

    545343c4298a6fa9a8e4350be6b0ef1dedfeafe0

  • SHA256

    f56f8f938febb9ebade541493d3c9ea9bf64dfa78597e2ec9dba545e9afb1578

  • SHA512

    ee305fc82b7e2f868a11b585861f239c7d27d149a82a483b2154f71230c4e3e94f26dd10036a2045f1a01b9f265210bbda5a18919a3b38352d729457068ae464

  • SSDEEP

    12288:BO7FJJ7gIgVj2du42aCrMP5IaAPD67w9rVad7FtJ7gIDVj2du42a1:U7FJJMPRAu4fC45wu7we7FtJMsRAu4f1

Score
9/10

Malware Config

Signatures

  • Renames multiple (546) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Windows directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DonnyhubPremium.exe
    "C:\Users\Admin\AppData\Local\Temp\DonnyhubPremium.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:1992
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
    1⤵
      PID:2592
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x494 0x508
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
      1⤵
        PID:1696
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\StepNew.cmd" "
        1⤵
          PID:1548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\ConvertSplit.cmd" "
          1⤵
            PID:2292

          Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1992-0-0x000000007467E000-0x000000007467F000-memory.dmp

                  Filesize

                  4KB

                • memory/1992-1-0x0000000000D90000-0x0000000000E4A000-memory.dmp

                  Filesize

                  744KB

                • memory/1992-2-0x0000000074670000-0x0000000074E20000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1992-3-0x0000000005F90000-0x0000000005FF6000-memory.dmp

                  Filesize

                  408KB

                • memory/1992-12-0x000000000A2F0000-0x000000000A328000-memory.dmp

                  Filesize

                  224KB

                • memory/1992-14-0x0000000074670000-0x0000000074E20000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1992-13-0x000000000A2B0000-0x000000000A2BE000-memory.dmp

                  Filesize

                  56KB

                • memory/1992-15-0x0000000074670000-0x0000000074E20000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1992-762-0x000000007467E000-0x000000007467F000-memory.dmp

                  Filesize

                  4KB

                • memory/1992-1087-0x0000000074670000-0x0000000074E20000-memory.dmp

                  Filesize

                  7.7MB