Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
56997e3f1d25faa0eea9091f72d20ae6384f180b7dc9940b3f6a814b32daebd9.pps
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
56997e3f1d25faa0eea9091f72d20ae6384f180b7dc9940b3f6a814b32daebd9.pps
Resource
win10v2004-20221111-en
General
-
Target
56997e3f1d25faa0eea9091f72d20ae6384f180b7dc9940b3f6a814b32daebd9.pps
-
Size
597KB
-
MD5
1d1c288d5b5464d9d28d054f98a45790
-
SHA1
4d3d3df51384e3ad1df25771cf02072d389df079
-
SHA256
56997e3f1d25faa0eea9091f72d20ae6384f180b7dc9940b3f6a814b32daebd9
-
SHA512
e200f3569d0ecb7190cc27c1e588ec6e40a5b44d87ac81938320e7a3f357f61444a25d9365e452f9592bbd963b225143eda6be020d3487105f4222b9b9062382
-
SSDEEP
1536:cZnc4LoAzpPsnnrvcyGnTZuqWFQizm+ayDZN6cKfKBg2Bt386MJMEVHkkjlRiUHR:PyRjwJTR1+rl3
Malware Config
Signatures
-
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 1292 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
POWERPNT.EXEdescription pid process target process PID 1292 wrote to memory of 984 1292 POWERPNT.EXE splwow64.exe PID 1292 wrote to memory of 984 1292 POWERPNT.EXE splwow64.exe PID 1292 wrote to memory of 984 1292 POWERPNT.EXE splwow64.exe PID 1292 wrote to memory of 984 1292 POWERPNT.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\56997e3f1d25faa0eea9091f72d20ae6384f180b7dc9940b3f6a814b32daebd9.pps"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:984