Analysis

  • max time kernel
    132s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 01:59

General

  • Target

    altorilievo.ppt

  • Size

    942KB

  • MD5

    e540c4fcecd77b819094eee15ced316a

  • SHA1

    d45eb272fdf83641c942c0b7c66aa1ae313738a0

  • SHA256

    577ddb0c94d3814a044af5a4ff2591f1e59d227ae00b37358427e2de2d80ff3d

  • SHA512

    01ae43e96ae17b121f2c44b2c67f8ef66e7e278331d4c27d98206304b3a25d3dc211c3a1e2e2c6de6c342007cb67dcfbd7b6af7eeec5c5af5ad8421472d09c8e

  • SSDEEP

    12288:wsHR4mkXyWdmHo6d7YfHJpb/k6GbudU+2fpshtAL0k4z3iaCI4c34IEF9cecrwWm:mmiy+AQpJk5qdlhtq4mawQEFmec037

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\altorilievo.ppt" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4052-0-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-2-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-3-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-4-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-1-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-5-0x00007FF90AEB0000-0x00007FF90B051000-memory.dmp

    Filesize

    1.6MB

  • memory/4052-6-0x00007FF8C8BD0000-0x00007FF8C8BE0000-memory.dmp

    Filesize

    64KB

  • memory/4052-7-0x00007FF8C8BD0000-0x00007FF8C8BE0000-memory.dmp

    Filesize

    64KB

  • memory/4052-30-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-33-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-32-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-31-0x00007FF8CB530000-0x00007FF8CB540000-memory.dmp

    Filesize

    64KB

  • memory/4052-34-0x00007FF90AEB0000-0x00007FF90B051000-memory.dmp

    Filesize

    1.6MB