Analysis
-
max time kernel
58s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2023, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
Project1243.ppsx
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Project1243.ppsx
Resource
win10-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
Project1243.ppsx
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
Project1243.ppsx
-
Size
32KB
-
MD5
b0b0188f132a37413498a71751d45d69
-
SHA1
b780294254cf74865eeb0614e5ae30c9f0e80f0a
-
SHA256
f828ba41ba009d9fe0d68726525959a541cf9af622a2c23179ff65a2f769a7ee
-
SHA512
28318fe647a0595bdab799ff5873d7ace565197a21b83e86b417ae36a8009126619ebb11a140b9ffc04a446f7c3a869efd62bf24c2a1a5884c0609cf59b2fec5
-
SSDEEP
768:TuaLO7nXnB1ELa9h94XGNcW/zOrrrIIMS0bS02S0dS04S03S0yS0JS00SneSnjSa:iTJIBBp
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2024 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2000 2024 POWERPNT.EXE 28 PID 2024 wrote to memory of 2000 2024 POWERPNT.EXE 28 PID 2024 wrote to memory of 2000 2024 POWERPNT.EXE 28 PID 2024 wrote to memory of 2000 2024 POWERPNT.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\Project1243.ppsx"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2000
-