Analysis

  • max time kernel
    153s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:05

General

  • Target

    Purchase Order form Industrial Equipment & Services Company Co Qatar........pps

  • Size

    75KB

  • MD5

    1650ab4f27afa1dd8f49fbc782abf405

  • SHA1

    e9a29e8328d42ca1e6a4a6614b575bc31dd1dc6b

  • SHA256

    15ceec1bd8ca11c8e7cefcbb7d80426cdc939654623f521b3fc7679c0a73c3b5

  • SHA512

    a1460d9e152ac75f76ff8db03279a590a3741ed246f609785e99e0c60763f85befaeae7142bea03ba544ee66266d7f494c134e74bc233996b4b00051ad2ff25b

  • SSDEEP

    384:XBDTR2EpOYOj3VRQthCiq+PM5Pde2/mOL0WVhMStQUo2T1snclFo39D:ZRbQYOjXQt4iq+PM5Pde2/n2Bncjo

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\Purchase Order form Industrial Equipment & Services Company Co Qatar........pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4264-132-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-133-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-134-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-135-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-136-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-137-0x00007FFD531B0000-0x00007FFD531C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-138-0x00007FFD531B0000-0x00007FFD531C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-140-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-141-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-142-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB

  • memory/4264-143-0x00007FFD55B10000-0x00007FFD55B20000-memory.dmp

    Filesize

    64KB