Resubmissions

10-03-2021 10:49

210310-52ql7z75jn 10

10-03-2021 10:44

210310-21czrtrdgs 10

10-03-2021 10:21

210310-ks3qvelnn2 8

Analysis

  • max time kernel
    135s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 10:21

General

  • Target

    f9498a2b0d6c38da6ad465a0135c5d20817bffeaf5ed09b9de8a7a22ec1ada58.pps

  • Size

    73KB

  • MD5

    d9946cecf7fb73bc664217e318af6eeb

  • SHA1

    d95ef8411af378d06dab649df35748775e4edfe7

  • SHA256

    f9498a2b0d6c38da6ad465a0135c5d20817bffeaf5ed09b9de8a7a22ec1ada58

  • SHA512

    698ba3cd10fddb7f291b4983dbd0ee77774344fb1c5930dbb4a50d94b386792ab666284360c40447e451767e3d5ddd4d259ad0c3017005538a70f73e0dcf81fa

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\f9498a2b0d6c38da6ad465a0135c5d20817bffeaf5ed09b9de8a7a22ec1ada58.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-2-0x00007FFACA170000-0x00007FFACA180000-memory.dmp
    Filesize

    64KB

  • memory/4760-3-0x00007FFACA170000-0x00007FFACA180000-memory.dmp
    Filesize

    64KB

  • memory/4760-4-0x00007FFACA170000-0x00007FFACA180000-memory.dmp
    Filesize

    64KB

  • memory/4760-5-0x00007FFAEC940000-0x00007FFAECF77000-memory.dmp
    Filesize

    6.2MB

  • memory/4760-6-0x00007FFACA170000-0x00007FFACA180000-memory.dmp
    Filesize

    64KB