Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter64.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PCHunter_v1.56/Readme-ZOL.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PCHunter_v1.56/Readme-ZOL.htm
Resource
win10v2004-20240802-en
General
-
Target
PCHunter_v1.56/Readme-ZOL.htm
-
Size
2KB
-
MD5
cb3eedb39a4b19375c929dd1ce6a671b
-
SHA1
c9321aafb5c98195aa35a54ae30f8aed8530d589
-
SHA256
7a0421963c81fb48f71c8a7727d9f33ec023b574befc6b35981aa388279086d7
-
SHA512
3dad8489626f5d87c6c0b8747908643a1f59df421821688ac272a19473f73427e707e4cea981fd1274d03ab597d22758f7c91f575369b15e7ab795d01c88e12e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 3060 msedge.exe 3060 msedge.exe 4840 identity_helper.exe 4840 identity_helper.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 988 3060 msedge.exe 83 PID 3060 wrote to memory of 988 3060 msedge.exe 83 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4300 3060 msedge.exe 85 PID 3060 wrote to memory of 4948 3060 msedge.exe 86 PID 3060 wrote to memory of 4948 3060 msedge.exe 86 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87 PID 3060 wrote to memory of 3092 3060 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\PCHunter_v1.56\Readme-ZOL.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e47182⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13696528659830678248,1923717119060437778,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
6KB
MD5d9f2fdf02e61144d39e25008936fb10e
SHA1db407b1024064dadc9054f2c35b8414177e29bda
SHA256dc60e403a0b2474b312eebf48a79718a38b81c6e058cea47a0f136e8813d4c8d
SHA51224357caa6a92d3141e031a508da040f7448d2a4b462e387787c584fdf9b71272ed0cd4f9a6b9e828e6515deb0dcf9f162fa87b5fa2134ba3d0ac9c102f1a0147
-
Filesize
5KB
MD515ff2fbd6a6f7a7368d5dc2076337d1e
SHA172f7fd98a50c15beb41c378d3cedfc15a4a26b55
SHA2564d3dffb636a4ac70d28cf06e8b653a4df466451b9209c26bc890b094708487a8
SHA51290b97249422bb9d64f41e52e9391f779f125e11bb5376783b49a2381a93a1413f43f850940ad23181c6625598b72e47d518feb7eacc4ae78fed3ff244e71e224
-
Filesize
6KB
MD593c5248b10d3c6e017afabedf66aec04
SHA12f3dbc272521c6e24270e1a2e69ef9489a9d7d0f
SHA2568d3b882a5f51da41cb0e51a1712e5e10d973f29150505c480acdb9e12baf7c50
SHA51233bd1b33b1a6374bc00e4444f69f6ddf7ccffb262c67043fad03e5b8bac47ed724a2527a7e676efb9413f45c3c7689c8f4badb8739718dfc9a05a1a6711dde3b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5209b1ecff2d0e07f722fcd27f80306dd
SHA1226cc58bb41eb4cc44b88ad62a39cac724bb7410
SHA2567e7d55cffc9f5a88580b0e241ebd0b6f3dde680eb6389070b7732177d8a39f7c
SHA512b55388d34221a5999c53c022e8e3b728ab587bb3a69cb1f64b274b5ebe1f73416759663831e55ff93d6cad3dc2b045783c675f8e34c11bf1325e808f3ed39094