Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
Reserva Detalhes.ppam
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Reserva Detalhes.ppam
Resource
win10v2004-20231023-en
General
-
Target
Reserva Detalhes.ppam
-
Size
7KB
-
MD5
a2300de0aa8bfeb7a375634ce97b398f
-
SHA1
abc002f46cd005cfa988c06a8eea7961a242eb93
-
SHA256
df5f15fb8a39c44fc8e2532288d4483f421152a0cb3b11e9769bba81e7b215ec
-
SHA512
2cd194f160440258c2e64ac62a7a3eb1eed4adc9dc4bac0897f057db6bfd0a3c8649fdb36265d58e0ba1a1ab1f297db1a31d28e9fd57bab5f3c03cbe070b9f82
-
SSDEEP
192:xrXP/xOKF8ZRJ44KzbKDH5AfhQT6TCNKk8b8:dXPoKF6RzZAmT6WNdr
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3608 4736 cmd.exe 43 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2232 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4736 POWERPNT.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4736 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4736 POWERPNT.EXE 4736 POWERPNT.EXE 4736 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3608 4736 POWERPNT.EXE 92 PID 4736 wrote to memory of 3608 4736 POWERPNT.EXE 92 PID 3608 wrote to memory of 2232 3608 cmd.exe 95 PID 3608 wrote to memory of 2232 3608 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Reserva Detalhes.ppam" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping 127.0.0.1 -n 10 > nul & start C:\Users\Public\document.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- Runs ping.exe
PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5cd312fbd7b495bb6e6a66ca1c3c8da82
SHA1ebed58eb7a0c9bf9018f26fdb5fb2806ad9ecc18
SHA25608855c537019d3cebae22b9d4f099a679793c6904adc01551b435a53654a8aec
SHA51291f01cd6648d41df8855af7b34809465d51d15e16602fce577b6f0b02d9568958bd05edf370fcba66300042d06d8583bef690f9ca8c8d795b7f6f87de75d877a