Analysis

  • max time kernel
    138s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 19:00

General

  • Target

    SecuriteInfo.com.Heur.11145.17111.pps

  • Size

    115KB

  • MD5

    ef0aed5496df29894d543f176f58ffb8

  • SHA1

    c76d78256b743d6401c2272b69eb307f1ada4a9a

  • SHA256

    d2f1f28bac56207164e2c5364be21700303c8a8b6ef05270038736255c4593b2

  • SHA512

    e02803c05b3ab2ffc3d93655d0c474f8af0813101da568e2f39e1c5e28d62f49aaf7d8627f1125e4d92a952cac0307b62a20686f0c0ff41dc96081dd4e204740

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.11145.17111.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:644

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-2-0x00007FF91CA20000-0x00007FF91D057000-memory.dmp
    Filesize

    6.2MB