Analysis
-
max time kernel
71s -
max time network
16s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-03-2021 19:53
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order.ppt
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
New Purchase Order.ppt
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
New Purchase Order.ppt
-
Size
66KB
-
MD5
20884369d25aeb20f8a45c464cab0ff4
-
SHA1
c81fe784cb90f374d6790fad65a0144f9bfce85f
-
SHA256
0d8264e6c9f93db868184bedfd0c54b5ad4ab8dd81b90c2e2106da6c1e9a4d3b
-
SHA512
9a0779d95cbd8dcd73a827da6e3654b1a55508f4b6886e9cd7b5e628833b54bb5c147aa966d0afa39b8cd4fa47d9b4155be62e752aa331a5f872f67a82048c07
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 16 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1800 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1748 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1796 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1732 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1440 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1564 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1584 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1064 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1520 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1500 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1096 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 2044 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 680 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 632 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 1852 1668 ping.exe POWERPNT.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 824 1668 ping.exe POWERPNT.EXE -
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE -
Modifies registry class 64 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493497-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A70-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934C4-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D5-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E7-5A91-11CF-8700-00AA0060263B}\ = "ScaleEffect" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493491-5A91-11CF-8700-00AA0060263B}\ = "RulerLevels" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149349A-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493461-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149347E-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493485-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CB-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F6-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A65-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493469-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493478-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493477-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149345E-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A55-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934EF-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A51-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A6E-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E552-4FF5-48F4-8215-5505F990966F}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493480-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493498-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493487-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934B9-5A91-11CF-8700-00AA0060263B}\ = "Tags" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E4-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E9-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F6-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A5E-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493455-5A91-11CF-8700-00AA0060263B}\ = "DocumentWindows" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493469-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934EC-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E557-4FF5-48F4-8215-5505F990966F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493442-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D0-5A91-11CF-8700-00AA0060263B}\ = "PublishObject" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493480-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493490-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493495-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493497-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493499-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CA-5A91-11CF-8700-00AA0060263B}\ = "Borders" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149345E-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493470-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A7B-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934ED-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A74-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493498-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CD-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A63-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A64-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493483-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348B-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CF-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D4-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934D8-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493458-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493496-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E6-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934EB-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A5B-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A62-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A6E-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A70-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32 POWERPNT.EXE -
Runs ping.exe 1 TTPs 16 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1796 ping.exe 1440 ping.exe 1520 ping.exe 680 ping.exe 824 ping.exe 1064 ping.exe 1800 ping.exe 1748 ping.exe 1564 ping.exe 1500 ping.exe 1096 ping.exe 632 ping.exe 1852 ping.exe 1732 ping.exe 1584 ping.exe 2044 ping.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 1668 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
POWERPNT.EXEdescription pid process target process PID 1668 wrote to memory of 1292 1668 POWERPNT.EXE splwow64.exe PID 1668 wrote to memory of 1292 1668 POWERPNT.EXE splwow64.exe PID 1668 wrote to memory of 1292 1668 POWERPNT.EXE splwow64.exe PID 1668 wrote to memory of 1292 1668 POWERPNT.EXE splwow64.exe PID 1668 wrote to memory of 1800 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1800 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1800 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1800 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1748 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1748 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1748 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1748 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1796 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1796 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1796 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1796 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1732 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1732 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1732 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1732 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1440 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1440 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1440 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1440 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1564 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1564 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1564 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1564 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1584 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1584 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1584 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1584 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1064 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1064 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1064 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1064 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1520 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1520 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1520 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1520 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1500 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1500 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1500 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1500 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1096 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1096 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1096 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 1096 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 2044 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 2044 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 2044 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 2044 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 680 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 680 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 680 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 680 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 632 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 632 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 632 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 632 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 824 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 824 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 824 1668 POWERPNT.EXE ping.exe PID 1668 wrote to memory of 824 1668 POWERPNT.EXE ping.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\New Purchase Order.ppt"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1292
-
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1800 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1748 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1796 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1732 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1440 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1564 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1584 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1064 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1520 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1500 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1096 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:2044 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:680 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:632 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:1852 -
C:\Windows\SysWOW64\ping.exeping 127.0.0.12⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/632-20-0x0000000000000000-mapping.dmp
-
memory/680-19-0x0000000000000000-mapping.dmp
-
memory/824-21-0x0000000000000000-mapping.dmp
-
memory/1064-14-0x0000000000000000-mapping.dmp
-
memory/1096-17-0x0000000000000000-mapping.dmp
-
memory/1292-5-0x0000000000000000-mapping.dmp
-
memory/1292-6-0x000007FEFB6F1000-0x000007FEFB6F3000-memory.dmpFilesize
8KB
-
memory/1440-11-0x0000000000000000-mapping.dmp
-
memory/1500-16-0x0000000000000000-mapping.dmp
-
memory/1520-15-0x0000000000000000-mapping.dmp
-
memory/1564-12-0x0000000000000000-mapping.dmp
-
memory/1584-13-0x0000000000000000-mapping.dmp
-
memory/1668-2-0x0000000073EB1000-0x0000000073EB5000-memory.dmpFilesize
16KB
-
memory/1668-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1668-3-0x0000000071001000-0x0000000071003000-memory.dmpFilesize
8KB
-
memory/1732-10-0x0000000000000000-mapping.dmp
-
memory/1748-8-0x0000000000000000-mapping.dmp
-
memory/1796-9-0x0000000000000000-mapping.dmp
-
memory/1800-7-0x0000000000000000-mapping.dmp
-
memory/1852-22-0x0000000000000000-mapping.dmp
-
memory/2044-18-0x0000000000000000-mapping.dmp