Analysis
-
max time kernel
1199s -
max time network
976s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2023, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
Convite Editável Dr MARCO ELISIO.pptx
Resource
win10v2004-20230621-en
5 signatures
1200 seconds
General
-
Target
Convite Editável Dr MARCO ELISIO.pptx
-
Size
737KB
-
MD5
0aeb27018ddb2f69f507cc963626bd22
-
SHA1
2306ddc9f8ac2ddb230c5a4efe33a65709a723f7
-
SHA256
ba2031b94b0638d88e5f60370f3cf6f20a5815bd7a360b21dc143495ec9af96a
-
SHA512
73fddd762d003a200488001ae71620831068528a3d5beff44ecd493be259c42f19ad8d40f4be7c718dd2d9d78f560dc852775ceda0415b6e2e6b6e7b76fa2989
-
SSDEEP
12288:stPYGA5Mlg+1M/klKfGSBHk8+sNV+iLiJhDNbBtG4nMmgsySamST9ihVUWPrJy:Vz81NKLHkW9LiJhZ73Mmgshams4Muw
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4420 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4420 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4420 POWERPNT.EXE 4420 POWERPNT.EXE 4420 POWERPNT.EXE 4420 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Convite Editável Dr MARCO ELISIO.pptx" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4420