Analysis

  • max time kernel
    1199s
  • max time network
    976s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2023, 05:21

General

  • Target

    Convite Editável Dr MARCO ELISIO.pptx

  • Size

    737KB

  • MD5

    0aeb27018ddb2f69f507cc963626bd22

  • SHA1

    2306ddc9f8ac2ddb230c5a4efe33a65709a723f7

  • SHA256

    ba2031b94b0638d88e5f60370f3cf6f20a5815bd7a360b21dc143495ec9af96a

  • SHA512

    73fddd762d003a200488001ae71620831068528a3d5beff44ecd493be259c42f19ad8d40f4be7c718dd2d9d78f560dc852775ceda0415b6e2e6b6e7b76fa2989

  • SSDEEP

    12288:stPYGA5Mlg+1M/klKfGSBHk8+sNV+iLiJhDNbBtG4nMmgsySamST9ihVUWPrJy:Vz81NKLHkW9LiJhZ73Mmgshams4Muw

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Convite Editável Dr MARCO ELISIO.pptx" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4420-133-0x00007FFAB97B0000-0x00007FFAB97C0000-memory.dmp

    Filesize

    64KB

  • memory/4420-134-0x00007FFAB97B0000-0x00007FFAB97C0000-memory.dmp

    Filesize

    64KB

  • memory/4420-135-0x00007FFAB97B0000-0x00007FFAB97C0000-memory.dmp

    Filesize

    64KB

  • memory/4420-136-0x00007FFAB97B0000-0x00007FFAB97C0000-memory.dmp

    Filesize

    64KB

  • memory/4420-137-0x00007FFAB97B0000-0x00007FFAB97C0000-memory.dmp

    Filesize

    64KB

  • memory/4420-138-0x00007FFAB7650000-0x00007FFAB7660000-memory.dmp

    Filesize

    64KB

  • memory/4420-139-0x00007FFAB7650000-0x00007FFAB7660000-memory.dmp

    Filesize

    64KB