Resubmissions

13/08/2021, 09:28

210813-fnjyawq6ws 10

13/08/2021, 09:23

210813-swdjcyat5e 10

13/08/2021, 07:05

210813-4dy26bbdfe 10

03/08/2021, 07:47

210803-jrlp4kfgt2 10

Analysis

  • max time kernel
    13s
  • max time network
    13s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03/08/2021, 07:47

General

  • Target

    InvoiceNo_8041766.ppt

  • Size

    82KB

  • MD5

    c27b99ba1c1e0e88a8362fd5b9193499

  • SHA1

    4aa04165daad8a8827d39067b117c2a81399f87d

  • SHA256

    c9eef29af749ee4e022d0852bfec6b85a382cb50d0dfcab2eeed1a89499fde48

  • SHA512

    8c7c17959905a83b503d5a1892a9950399ae6d1f0b4859a4b2cfaf0c0bb176cebf64d9992b93d5b32d8aca95dff13821303ad5d234109f65de4ac03fdc80a892

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\InvoiceNo_8041766.ppt" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:632

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/632-114-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp

          Filesize

          64KB

        • memory/632-115-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp

          Filesize

          64KB

        • memory/632-116-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp

          Filesize

          64KB

        • memory/632-117-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp

          Filesize

          64KB

        • memory/632-119-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp

          Filesize

          64KB

        • memory/632-118-0x00007FFAE6D30000-0x00007FFAE890D000-memory.dmp

          Filesize

          27.9MB

        • memory/632-122-0x00007FFAE3660000-0x00007FFAE474E000-memory.dmp

          Filesize

          16.9MB

        • memory/632-123-0x00007FFADF6C0000-0x00007FFAE15B5000-memory.dmp

          Filesize

          31.0MB