Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe
Resource
win10v2004-20240426-en
General
-
Target
009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe
-
Size
1.1MB
-
MD5
d0e6a7c89ed75ea559bd9d22e2de3625
-
SHA1
041fc8035b7e3ea0c64b8350b65337f2fac3d654
-
SHA256
009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f
-
SHA512
3587c6876542a52014a4cc089d82df690b9fa7c17d7faa1399ff05f664b56dd232989c4ffa953758ec62a9a84de288d3c2fedc1de8b97e349ee3e89cf174324a
-
SSDEEP
24576:ALLjE75RMcYOJkYwxi8xp6rCHEEmlvRUQtPYY9:AAMcYugip+HEDl5UQFYY9
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2020 009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 860 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe 860 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 2672 860 POWERPNT.EXE 30 PID 860 wrote to memory of 2672 860 POWERPNT.EXE 30 PID 860 wrote to memory of 2672 860 POWERPNT.EXE 30 PID 860 wrote to memory of 2672 860 POWERPNT.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe"C:\Users\Admin\AppData\Local\Temp\009b677564b3ebb0831171edf3fb0deb0fa3b0010b74586e01d8df4af965ef3f.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2020
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\Desktop\ConvertPop.pptm"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2672
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1812