Analysis
-
max time kernel
37s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 02:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
pornhub.exe
Resource
win10v2004-20240611-en
7 signatures
150 seconds
General
-
Target
pornhub.exe
-
Size
1.9MB
-
MD5
e7117f2f7fa1270692cebf5784b255e9
-
SHA1
09f67cd075a94077964a6d64326a1b3755069eb3
-
SHA256
f0cd71edabf49bc65c7de45cebd7dbb972ad216302155e555bde69484ce3ba98
-
SHA512
a4fec6e9574f843cabe8bdee96fe1d8ea7c738cfb55b3f3acc8eb955b3db87533918b65c571e541a57b5bd52160cf46cf6295801c600ace94a16c61d18fafd16
-
SSDEEP
49152:b/yNSwDDkqs+Lgon7lBGf9/nuSJtrBmO7iR8:baEuAJ3t7K
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4252 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3716 taskmgr.exe Token: SeSystemProfilePrivilege 3716 taskmgr.exe Token: SeCreateGlobalPrivilege 3716 taskmgr.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe 3716 taskmgr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3912 2188 pornhub.exe 88 PID 2188 wrote to memory of 3912 2188 pornhub.exe 88 PID 2188 wrote to memory of 2968 2188 pornhub.exe 91 PID 2188 wrote to memory of 2968 2188 pornhub.exe 91 PID 2968 wrote to memory of 4004 2968 cmd.exe 92 PID 2968 wrote to memory of 4004 2968 cmd.exe 92 PID 2968 wrote to memory of 1060 2968 cmd.exe 93 PID 2968 wrote to memory of 1060 2968 cmd.exe 93 PID 2968 wrote to memory of 2336 2968 cmd.exe 94 PID 2968 wrote to memory of 2336 2968 cmd.exe 94 PID 2188 wrote to memory of 1408 2188 pornhub.exe 99 PID 2188 wrote to memory of 1408 2188 pornhub.exe 99 PID 1408 wrote to memory of 3864 1408 cmd.exe 100 PID 1408 wrote to memory of 3864 1408 cmd.exe 100 PID 3864 wrote to memory of 4252 3864 cmd.exe 105 PID 3864 wrote to memory of 4252 3864 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\pornhub.exe"C:\Users\Admin\AppData\Local\Temp\pornhub.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 4F2⤵PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\pornhub.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\pornhub.exe" MD53⤵PID:4004
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1060
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo SSL connect error && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:4252
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3716