Resubmissions

05-12-2022 15:20

221205-sqqajsfa6x 1

Analysis

  • max time kernel
    71s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-12-2022 15:20

General

  • Target

    gd.ppsx

  • Size

    161KB

  • MD5

    64121e0a36c19efcbbb5d8557eea0c61

  • SHA1

    e73227aeb225b86a579ef35c33f8a1b305da2154

  • SHA256

    597226929e5b8340fe26e42609ab660b9ed97d61f99464599739b50ee719788b

  • SHA512

    7cb1ecad78e39a638179beb4f50ca6d59a0450cb8df297ca38eeba8653a1c57d92a3820d5b91a2c40fccd689f9f4092ddccfd4b0ee317c7e89368f77d19167e8

  • SSDEEP

    3072:UzMFyCVdUlQlpcv6DlVOEBp8BmkoTPRsYAvbGJ3Lhii4+3XEb9bKDP7sGe:UzMDUSq6/uORs/v6yiJ30b9bK3s3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\gd.ppsx" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/572-120-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-121-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-122-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-123-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-132-0x00007FF8BB350000-0x00007FF8BB360000-memory.dmp

    Filesize

    64KB

  • memory/572-133-0x00007FF8BB350000-0x00007FF8BB360000-memory.dmp

    Filesize

    64KB

  • memory/572-292-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-293-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-294-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB

  • memory/572-295-0x00007FF8BE980000-0x00007FF8BE990000-memory.dmp

    Filesize

    64KB