Analysis
-
max time kernel
158s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:56
Static task
static1
Behavioral task
behavioral1
Sample
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe
Resource
win10v2004-20221111-en
General
-
Target
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe
-
Size
2.6MB
-
MD5
ebc9ba7ef7e078bc403b8ef0b8a6e1ee
-
SHA1
5ffe76534fd03b32984efff1db2f8715e58703dc
-
SHA256
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802
-
SHA512
332cfe257c66f6a0e99f84c3cafafa19cb4e2384dbefe37addb215019a4f9c11291c366476bee778df9466ea52304ca9aac9ae9667962ac6d0ced5c0caa2a148
-
SSDEEP
49152:CKNmFAzae9eKXRxRcdKc8EIAQEbQCyexJs2yYPPBCE5uUBvi3ZHJxsaOMRJ:WFWUKnudKII1Eb7dhHRQLZpuK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ppview32.exepid process 2508 ppview32.exe -
Loads dropped DLL 6 IoCs
Processes:
ppview32.exepid process 2508 ppview32.exe 2508 ppview32.exe 2508 ppview32.exe 2508 ppview32.exe 2508 ppview32.exe 2508 ppview32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 38 IoCs
Processes:
ppview32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\FLAGS ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0\win32 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A} ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ = "_Application" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A} ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\HELPDIR ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0 ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\ = "Microsoft PowerPointViewer 8.0 Object Library" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\msppt8vr.olb" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\ = "{FCE18140-B12B-11D0-B06A-00AA0060271A}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A} ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ = "SlideShowView" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\TypeLib\Version = "2.0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ = "SlideShowView" ppview32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE18150-B12B-11D0-B06A-00AA0060271A}\ProxyStubClsid32 ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FCE18140-B12B-11D0-B06A-00AA0060271A}\2.0\FLAGS\ = "0" ppview32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE18142-B12B-11D0-B06A-00AA0060271A}\ = "_Application" ppview32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ppview32.exepid process 2508 ppview32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ppview32.exedescription pid process Token: 33 2508 ppview32.exe Token: SeIncBasePriorityPrivilege 2508 ppview32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exedescription pid process target process PID 3360 wrote to memory of 2508 3360 e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe ppview32.exe PID 3360 wrote to memory of 2508 3360 e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe ppview32.exe PID 3360 wrote to memory of 2508 3360 e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe ppview32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe"C:\Users\Admin\AppData\Local\Temp\e8708f1a7c00191cdc85cced4f94b9df8adfdfccfa331d509a047d44ebb76802.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exe PhxQsg.ppt2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HLink.dllFilesize
80KB
MD592db419fd98b197e73b57997d83fea52
SHA1195246cff5e7f8fc313a7a47948a8f57b8b3ce08
SHA256e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97
SHA512a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSO97v.DLLFilesize
1.6MB
MD55a5abb409208ec32459aa1bc6f70b357
SHA136edf66cbf1020558e613d6cf91f790943e49ce5
SHA256f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f
SHA512801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSV7ENU.DLLFilesize
223KB
MD50a97e3993a4d202275aaaf990fd4492e
SHA19ce5f40bc2271d6ab357031fe5c443e3e776a9ec
SHA256bdc49896d6a38f4d6ae3ca3b42233ba4bd4842e35a4459386e9c7d12fa15b640
SHA51264c778bdb7e30725a1e32a69d24643223bfe0913be6c0339106bb3b1d99eaa4549386ab2bf7d553a0ad1b72f1bb3250a43387088336e768ac0f2e13b8abf4e07
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPIntlv.DLLFilesize
154KB
MD55c5faeebdcc03ab60a8f968d9fd56548
SHA1f0633c6d4238cb59c7cdfa4ea2aeca0019901e67
SHA256366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8
SHA51271c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PhxQsg.pptFilesize
214KB
MD57738aeb45841e76138549fef14d61dae
SHA1b3feea0075b139c86f6954bdb6a1703d82dcb7cf
SHA2562e63d5e531ba43aea0aac8d60c6ab88cb05608a79f7286a86a6383715b83d7da
SHA512a0baa487839ebefa474b8829eba66e7fd2ac0511278149a3c773d39130bcc8dd2344b0b61ef664efbae25e6b5b003a9866c620218ba40c68855f0dda304a360f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hlink.dllFilesize
80KB
MD592db419fd98b197e73b57997d83fea52
SHA1195246cff5e7f8fc313a7a47948a8f57b8b3ce08
SHA256e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97
SHA512a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hlink.dllFilesize
80KB
MD592db419fd98b197e73b57997d83fea52
SHA1195246cff5e7f8fc313a7a47948a8f57b8b3ce08
SHA256e138dc8267b86411afc81cd9a6148334f55b027173765d1b07abf4a97ab5da97
SHA512a08a25c36fa0d3ae1ef323f36842f87259bcb9f8572f44caedd69c02e76b611c94e08baa6f38b6ed320ae9528f8ac56aab87401fdb709f87cb6d3629f7873a0b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mso97v.dllFilesize
1.6MB
MD55a5abb409208ec32459aa1bc6f70b357
SHA136edf66cbf1020558e613d6cf91f790943e49ce5
SHA256f3159691bdf53f63b4e588c04333599e9086a0a7eb59bddac4d7331f5aff274f
SHA512801ec5d74bf0436dc54c9e22c5e941f5ea481c41fe618f06b4e139c36f6dcd9b1417be63353ee661c285312e5861d2c534ddecbd5ca7af851c8d706f8bf333ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msppt8vr.olbFilesize
5KB
MD52c78fccd977621990cf608f0f5a50740
SHA153bbaa08ec35b092f7a08a53b7e8b2da744d7052
SHA256b1c6335b894d68979a48b7460c2d476d7c32a2fa67d24c89bb26c9b621a6a5a9
SHA51253da3decc95513b11707393028df4bad28e48d29526c654aa0ced10549a38d4f0572246dd8ea09dfcf6f4688c3b7c4c41c54586916ee3355c7e2887e93dde2fb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppintlv.dllFilesize
154KB
MD55c5faeebdcc03ab60a8f968d9fd56548
SHA1f0633c6d4238cb59c7cdfa4ea2aeca0019901e67
SHA256366ed2fa94f707f7cf0800771d8daae8574ce5d1bab2b4bebd1e92d84a2d6fe8
SHA51271c70d82c673188063f43b6ba50c21fc048e397e62df87f489dd90e96c788168b55de56f952790f2f0a386bb5c120c94980131c5a527939564de8efbb07cf37f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exeFilesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ppview32.exeFilesize
1.4MB
MD5e00540bd2e24a5076116f84d79e9dfda
SHA1b1dfd2ffa0d53ee1c808295ba65a2bc0be76e9e9
SHA256d6a1181d115b535ddc9323caf6f4d7880e2ff34b44fb2dfb143f78b8728e80f6
SHA5122f0d5709c4f9bef00b4197785153e09ecfc3a3c4f3f3381c46ac019bfcafc53e5c99379115abd7837a5c31b9eba769a151f5316e18a65d0ac7cbd4f2404c1fe6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dllFilesize
438KB
MD5e14bf01b9dc91cc8e370717198deb5ad
SHA1fedfa71917b7ae48c19cb683e50dfe6f804a89fa
SHA256c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81
SHA512759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dllFilesize
438KB
MD5e14bf01b9dc91cc8e370717198deb5ad
SHA1fedfa71917b7ae48c19cb683e50dfe6f804a89fa
SHA256c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81
SHA512759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urlmon.dllFilesize
438KB
MD5e14bf01b9dc91cc8e370717198deb5ad
SHA1fedfa71917b7ae48c19cb683e50dfe6f804a89fa
SHA256c7b2378febf713e4c8e52d8b754f879f43b452693943db4ad0181030fe02cb81
SHA512759ebf8524120ea8736617eedb72031f5779ee1ce194ac9eba277be5ff21d44271d99d245be41d3f30ab18917b53ea682c4c6f2520203b25ae20f018b8238876
-
memory/2508-132-0x0000000000000000-mapping.dmp
-
memory/2508-145-0x0000000005250000-0x0000000005264000-memory.dmpFilesize
80KB
-
memory/2508-146-0x0000000005251000-0x0000000005260000-memory.dmpFilesize
60KB
-
memory/2508-150-0x0000000005270000-0x00000000052E8000-memory.dmpFilesize
480KB
-
memory/2508-151-0x0000000005271000-0x00000000052C9000-memory.dmpFilesize
352KB