Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
13/11/2023, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
V154- UPF Cookbook Training.pptx
Resource
win10-20231020-en
4 signatures
150 seconds
General
-
Target
V154- UPF Cookbook Training.pptx
-
Size
5.3MB
-
MD5
ec17b1104309ffb8722c6d6d2131a02e
-
SHA1
70bb2d8b1c393dfee4738fbfb88edb3d20092cdc
-
SHA256
d8a271e32dc0129e66478846249f4f193bcce35c707b7f3342e3b5d3d8b4e5db
-
SHA512
66653c8309a50bed15a0321f6ac02325e86824db60e1a7d9db5bf8388a2b6ca3a837b6285eda9a81d022a19ae1d1de3875d288beaf89863e942038712edf77a0
-
SSDEEP
98304:0C7+Ifjp2WwLKW9FveFgmfEz3KRgrjbjc8XGIWLZNwC3hQAAZk14Dz:0Cy0dNwKWjjoe3K6b4MpWLFxmZk6X
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 368 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 368 POWERPNT.EXE 368 POWERPNT.EXE 368 POWERPNT.EXE 368 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\V154- UPF Cookbook Training.pptx" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:368