Analysis
-
max time kernel
153s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:05
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order form Industrial Equipment & Services Company Co Qatar........pps
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase Order form Industrial Equipment & Services Company Co Qatar........pps
Resource
win10v2004-20220812-en
General
-
Target
Purchase Order form Industrial Equipment & Services Company Co Qatar........pps
-
Size
75KB
-
MD5
1650ab4f27afa1dd8f49fbc782abf405
-
SHA1
e9a29e8328d42ca1e6a4a6614b575bc31dd1dc6b
-
SHA256
15ceec1bd8ca11c8e7cefcbb7d80426cdc939654623f521b3fc7679c0a73c3b5
-
SHA512
a1460d9e152ac75f76ff8db03279a590a3741ed246f609785e99e0c60763f85befaeae7142bea03ba544ee66266d7f494c134e74bc233996b4b00051ad2ff25b
-
SSDEEP
384:XBDTR2EpOYOj3VRQthCiq+PM5Pde2/mOL0WVhMStQUo2T1snclFo39D:ZRbQYOjXQt4iq+PM5Pde2/n2Bncjo
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 4264 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
POWERPNT.EXEpid process 4264 POWERPNT.EXE 4264 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\Purchase Order form Industrial Equipment & Services Company Co Qatar........pps" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4264