Analysis
-
max time kernel
81s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:20
Behavioral task
behavioral1
Sample
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe
Resource
win10v2004-20220901-en
General
-
Target
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe
-
Size
3.9MB
-
MD5
9751411cfe130e1b401cfacb13ccfe40
-
SHA1
36d53268e854c4d9271b2abcca95614dda1e9eab
-
SHA256
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427
-
SHA512
6683cbf2a5f1d396191cfe7c46ac6b88b515c4e7844dd4ae1b90d1bb31eb508f92b7d85fb28fdb9b793a79931d9e6d0c1c3476ea5c39deccbece0bc24fdb5865
-
SSDEEP
98304:XrecafIV5LadMg6E9nOt1S2jOkTSsTQam6/sygOzy:7dafC5ed7nS1S2j5SscaH/sygO2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\jtkC15D.tmp acprotect C:\Users\Admin\AppData\Local\Temp\jtkC15D.tmp acprotect \Users\Admin\AppData\Local\Temp\jtkC15D.tmp acprotect -
Processes:
resource yara_rule behavioral1/memory/1096-55-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1096-67-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exePOWERPNT.EXEpid process 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe 268 POWERPNT.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 268 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exepid process 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exePOWERPNT.EXEdescription pid process target process PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 1096 wrote to memory of 268 1096 80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe POWERPNT.EXE PID 268 wrote to memory of 1328 268 POWERPNT.EXE splwow64.exe PID 268 wrote to memory of 1328 268 POWERPNT.EXE splwow64.exe PID 268 wrote to memory of 1328 268 POWERPNT.EXE splwow64.exe PID 268 wrote to memory of 1328 268 POWERPNT.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe"C:\Users\Admin\AppData\Local\Temp\80b0e9b6b64e48605bb67612733393654a231c71187a5de3f3d8afe49a8df427.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\pps5.ppt"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jtkC15D.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
C:\Users\Admin\AppData\Local\Temp\pps5.pptFilesize
3.7MB
MD526b8dd0257839d200e450c5585d8a587
SHA11144d3bece757131bbb489bb261911bc57978f29
SHA256ff95978437372b006f2b2815bfcf95e177f9855239624927014cad44dcf6cda8
SHA5126319b24e37cf28cb01bb16bcea2f06f6b991d490226ac2884a990ada90e2b12766a8f24f3acdb4cedc012242ef034892d31bf91aab0d28e07a1ba0d4978ec0a1
-
\Users\Admin\AppData\Local\Temp\jtkC15D.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
\Users\Admin\AppData\Local\Temp\jtkC15D.tmpFilesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
memory/268-75-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/268-59-0x0000000000000000-mapping.dmp
-
memory/268-60-0x0000000073701000-0x0000000073705000-memory.dmpFilesize
16KB
-
memory/268-62-0x0000000071181000-0x0000000071183000-memory.dmpFilesize
8KB
-
memory/268-74-0x000000007216D000-0x0000000072178000-memory.dmpFilesize
44KB
-
memory/268-68-0x00000000021A0000-0x0000000002213000-memory.dmpFilesize
460KB
-
memory/268-72-0x000000007216D000-0x0000000072178000-memory.dmpFilesize
44KB
-
memory/268-76-0x000000007216D000-0x0000000072178000-memory.dmpFilesize
44KB
-
memory/268-69-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1096-65-0x0000000000260000-0x00000000002D3000-memory.dmpFilesize
460KB
-
memory/1096-67-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1096-66-0x0000000000240000-0x000000000024D000-memory.dmpFilesize
52KB
-
memory/1096-54-0x0000000075C41000-0x0000000075C43000-memory.dmpFilesize
8KB
-
memory/1096-58-0x0000000000260000-0x00000000002D3000-memory.dmpFilesize
460KB
-
memory/1096-57-0x0000000000240000-0x0000000000265000-memory.dmpFilesize
148KB
-
memory/1096-55-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1328-70-0x0000000000000000-mapping.dmp
-
memory/1328-73-0x000007FEFC2E1000-0x000007FEFC2E3000-memory.dmpFilesize
8KB