Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 12:11

General

  • Target

    #!~#0Pen_9898_P@$SW0rd~!!$/hogg.pptx

  • Size

    85KB

  • MD5

    4a1bb50a70821601f854cb93681f57a1

  • SHA1

    be7d7dabd24c40066f301499dae299cb90afd8c1

  • SHA256

    4db21e4665018a3e6cd03ec1b65f42a1c6c8f8046b3f451a1e025a2013e8203f

  • SHA512

    c8157213c3232cefc4e2d075091b1b848b67b2a802244e368223a89e22ee90e8b46f0e5f6c09ecb251ada5c4fe9325d1009fc81f31baa1e1367923a879fd4f7a

  • SSDEEP

    1536:zD9bYCak3t5H8JDtUetbmzSniODDjrghDiR8ID5hHKRwh:zDKPpTAzQoYmRo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\#!~#0Pen_9898_P@$SW0rd~!!$\hogg.pptx"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1672

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2332-0-0x000000002D9D1000-0x000000002D9D2000-memory.dmp
      Filesize

      4KB

    • memory/2332-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2332-2-0x000000007259D000-0x00000000725A8000-memory.dmp
      Filesize

      44KB

    • memory/2332-5-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2332-6-0x000000007259D000-0x00000000725A8000-memory.dmp
      Filesize

      44KB