Resubmissions

23/11/2024, 09:01

241123-kza8zsylgq 1

19/11/2024, 20:57

241119-zr243ataqq 1

19/11/2024, 20:56

241119-zrjbyssdme 1

19/11/2024, 20:56

241119-zq23nsxlhq 1

18/11/2024, 16:58

241118-vgw3va1flr 4

18/11/2024, 16:57

241118-vgf2ma1flk 4

18/11/2024, 16:55

241118-vfl69azret 4

18/11/2024, 16:54

241118-vexllawjhj 4

Analysis

  • max time kernel
    75s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 09:01

General

  • Target

    Мартин Лутер Кинг.pptx

  • Size

    86KB

  • MD5

    d7cf06ef35e9e3bce4e56f88f1a860fe

  • SHA1

    55a0747af02c5936364dd2deaab154f5fcdd8f11

  • SHA256

    e0942905ee300feb0b77ddea4a493fa278efa9e80ac39fd508852aea6e27943e

  • SHA512

    7cf9c83dc41ffeb0a2e9b531df188751707c9d35e2bdf368ce93575d7e76e3906ac38051dc0bd84a9e81260927bea13dc0402c46fb29d987ebe04e99dfd365d2

  • SSDEEP

    1536:aHwHhWWVCtWsnalBAn8w4Q4aWup5EiDIc0Rg+NilfV6c:cWMtW9lWuup5Eix0Xi

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Мартин Лутер Кинг.pptx" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3916
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\system32\mountvol.exe
      mountvol c: /d
      2⤵
        PID:1084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3916-1-0x00007FFEE514D000-0x00007FFEE514E000-memory.dmp

      Filesize

      4KB

    • memory/3916-0-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-3-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-4-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-2-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-7-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-6-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-5-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-8-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-10-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-11-0x00007FFEA2BB0000-0x00007FFEA2BC0000-memory.dmp

      Filesize

      64KB

    • memory/3916-12-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-9-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-13-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-14-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-16-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-17-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-19-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-18-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3916-15-0x00007FFEA2BB0000-0x00007FFEA2BC0000-memory.dmp

      Filesize

      64KB

    • memory/3916-47-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-46-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-45-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-44-0x00007FFEA5130000-0x00007FFEA5140000-memory.dmp

      Filesize

      64KB

    • memory/3916-48-0x00007FFEE50B0000-0x00007FFEE52A5000-memory.dmp

      Filesize

      2.0MB