Analysis

  • max time kernel
    1482s
  • max time network
    1453s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-02-2024 12:42

General

  • Target

    ppt9FD5.pptx

  • Size

    6.6MB

  • MD5

    52ef9d25895e4bf3b323e616f39bfd65

  • SHA1

    4f16eb2825193e30f51e38f75a5eb7e1ec93ef16

  • SHA256

    ea16c4a621467e6ecdbfc2d96f8241a105840897ebeb9dd29f9ee0f899248c9f

  • SHA512

    2d4948b8d82b5d041c8f6e1e6bc56bff697cdb47ea2160756103a3a205556e72cb9344dda943f594fecf7acdc308ffd9dfe0cd11f4c1947648b91bebae6f2492

  • SSDEEP

    196608:NrBlbyKmJ7Fjha9NnLssqRkKcTspHscm0L:PlbQFjS5+5pHsz0L

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\ppt9FD5.pptx" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4996-0-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-1-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-2-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-3-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-6-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-5-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-4-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-7-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-8-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-9-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-10-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-11-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-13-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-12-0x00007FFCBE2E0000-0x00007FFCBE2F0000-memory.dmp

    Filesize

    64KB

  • memory/4996-15-0x00007FFCBE2E0000-0x00007FFCBE2F0000-memory.dmp

    Filesize

    64KB

  • memory/4996-17-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-18-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-16-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-14-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-19-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-20-0x00007FFCFE5C0000-0x00007FFCFE67D000-memory.dmp

    Filesize

    756KB

  • memory/4996-21-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-35-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-36-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-37-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-38-0x00007FFCC06F0000-0x00007FFCC0700000-memory.dmp

    Filesize

    64KB

  • memory/4996-39-0x00007FFD00660000-0x00007FFD00869000-memory.dmp

    Filesize

    2.0MB

  • memory/4996-40-0x00007FFCFE5C0000-0x00007FFCFE67D000-memory.dmp

    Filesize

    756KB