Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
25/02/2022, 20:51
Behavioral task
behavioral1
Sample
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c.dll
Resource
win10-20220223-en
0 signatures
0 seconds
General
-
Target
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c.dll
-
Size
313KB
-
MD5
35abfb98dac5bf48f7ac0e67afc9bdb7
-
SHA1
9185029c2630b220a74620c8f3d04886a457e1cf
-
SHA256
1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
-
SHA512
93f1336e3bc7ac01561f0ad7ce5fec7ae078e55db0f5b0cf0663cb5dbbe2acb08f27490da179e27579debc04843bf02f047456c516bf0345ba827e0efe85149a
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4072 2264 WerFault.exe 41 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3980 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe 4072 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4072 WerFault.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3980 POWERPNT.EXE 3980 POWERPNT.EXE 3980 POWERPNT.EXE 3980 POWERPNT.EXE 3980 POWERPNT.EXE 3980 POWERPNT.EXE 3980 POWERPNT.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c.dll,#11⤵PID:2264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2264 -s 2842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\StopRevoke.potx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3980