Analysis

  • max time kernel
    299s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 18:33

General

  • Target

    PPPwnUI-release2.0/PPPwn/stage2/960/stage2.elf

  • Size

    5KB

  • MD5

    7e90eecdc67d00bbe20a105b4d59f5cf

  • SHA1

    b808523210d4badc79890920ae908d9a21c15b58

  • SHA256

    02c105abd7620274dd92b210f0d7bf38464ea3986e9cbfa0b85412367effe642

  • SHA512

    e5fec8b36b9ff6e9422b3b35684d5e8622d185a5a1e347e21fd983f2859975a63591b9d6254bb3c1428ab9337d471f0611f0a6fd195e3c62956c961856306912

  • SSDEEP

    12:Bv7/Um4m22J6qFpZXFlQXeDpjCbD8B9aqTWLN7W/4l4uHlqlAkLI/Wijk19VGF+e:RMA027pa8WJ7WQlxF9k1yF+hhIWNj

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PPPwnUI-release2.0\PPPwn\stage2\960\stage2.elf
    1⤵
    • Modifies registry class
    PID:4936
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4400

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads