Overview
overview
7Static
static
7WPS_Office...ET.apk
android-9-x86
7JPExcel.xlsx
windows7-x64
1JPExcel.xlsx
windows10-2004-x64
1Sudoku.xlsx
windows7-x64
1Sudoku.xlsx
windows10-2004-x64
1ThExcel.xlsx
windows7-x64
1ThExcel.xlsx
windows10-2004-x64
1blank.doc
windows7-x64
4blank.doc
windows10-2004-x64
1blank.docx
windows7-x64
4blank.docx
windows10-2004-x64
1blank.pptx
windows7-x64
1blank.pptx
windows10-2004-x64
1blank.xls
windows7-x64
1blank.xls
windows10-2004-x64
1blank.xlsx
windows7-x64
1blank.xlsx
windows10-2004-x64
1default.xls
windows7-x64
1default.xls
windows10-2004-x64
1guide.pdf
windows7-x64
1guide.pdf
windows10-2004-x64
1ksMailTemplate.html
windows7-x64
1ksMailTemplate.html
windows10-2004-x64
1ksMailView_mixed.js
windows7-x64
1ksMailView_mixed.js
windows10-2004-x64
1login_bridge.html
windows7-x64
1login_bridge.html
windows10-2004-x64
1openplatfo...t.html
windows7-x64
1openplatfo...t.html
windows10-2004-x64
1secdoctemplate.doc
windows7-x64
4secdoctemplate.doc
windows10-2004-x64
1secdoctemplate.ppt
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 21:59
Behavioral task
behavioral1
Sample
WPS_Office-Premium-v18.2_build_1466-Mod_ROCKMODS.NET.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
JPExcel.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
JPExcel.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
Sudoku.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
Sudoku.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
ThExcel.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
ThExcel.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
blank.doc
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
blank.doc
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
blank.docx
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
blank.docx
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
blank.pptx
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
blank.pptx
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
blank.xls
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
blank.xls
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
blank.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
blank.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
default.xls
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
default.xls
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
guide.pdf
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
guide.pdf
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
ksMailTemplate.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
ksMailTemplate.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
ksMailView_mixed.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
ksMailView_mixed.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
login_bridge.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
login_bridge.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
openplatform_invalid_host.html
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
openplatform_invalid_host.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
secdoctemplate.doc
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
secdoctemplate.doc
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
secdoctemplate.ppt
Resource
win7-20230831-en
General
-
Target
secdoctemplate.ppt
-
Size
47KB
-
MD5
bf34a905b179a457f781201ce299f5df
-
SHA1
0e9136b6816a47176169e540d8a9f103eb646b1a
-
SHA256
361bd5b5223bf1be8b0a9150f432c422e8f4fb1cd5a615d9654a70e0b870826c
-
SHA512
b80f2a5b4444c9dcea7aad46a29df864b85528ae9008e8db2e02a34218e4be319cf9ee5753589889aceddfe60805496ddde535ccc0d493d8390ac06940d6074c
-
SSDEEP
768:g5OBrXM8332+N1ZhCjndI/1OJnwWQU+Tom24v2ehr/Enocoiv6FxgNv2:goBr8833F1uDdI9mUTom/v26cnocoiCI
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2980 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2980 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE 2980 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1812 2980 POWERPNT.EXE 28 PID 2980 wrote to memory of 1812 2980 POWERPNT.EXE 28 PID 2980 wrote to memory of 1812 2980 POWERPNT.EXE 28 PID 2980 wrote to memory of 1812 2980 POWERPNT.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\secdoctemplate.ppt"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1812
-