Analysis
-
max time kernel
123s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7.exe
Resource
win10v2004-20220812-en
General
-
Target
5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7.exe
-
Size
242KB
-
MD5
1621b92bb676cba4e4c8a76f4d3cb6e1
-
SHA1
be3bea5bb15d2c7762f8c6d7bc486773d04a9447
-
SHA256
5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7
-
SHA512
e3bd81d489b2dff26ccabb31f6009618f58d2dd4795a1bd595285ddd0b66d0d59cef7d786488664f597b41ad49b3f3a06a9efa85427be3ca1171f782d9230d94
-
SSDEEP
6144:5GJ8INOScWJQ74x6VdTNjk7emAgq0HxMdyJSoqa9LW:ktKWJQ7JdTi7emAgq+xMd+7tW
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 2528 WerFault.exe 90 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3456 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3456 POWERPNT.EXE 3456 POWERPNT.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7.exe"C:\Users\Admin\AppData\Local\Temp\5df4d5bbd816a3d5c4edbd0fbdb3a35426172b6a971dc77e1d4fcfd87d960fe7.exe"1⤵PID:1456
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\ReadReset.ppsx" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3456
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 2528 -ip 25281⤵PID:4756
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2528 -s 22281⤵
- Program crash
PID:1416