Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
ali-test file.pptx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ali-test file.pptx
Resource
win10v2004-20240802-en
General
-
Target
ali-test file.pptx
-
Size
36KB
-
MD5
4daa434f6f4046fb0f20174cdc107ed2
-
SHA1
d1ac48a003d9995d4c8ddf9624eed009a46f5082
-
SHA256
232a4d8ad939d5b435fb6c89f4120fd594d0b349af2e693d813b3473a7a6c35a
-
SHA512
e576ee0a558fcafde372975850210ef164a663537fdb3779b85a198f0ffb3507bcbc398c52728faced7c14ac53b355b344dfc3b013199ef6e4ab3e8ae33dcb96
-
SSDEEP
768:nyk9Y+TToPyYMWPhrLq9GGgT+u7cLH0CvAY64+6BIMS0bS02S0dS04S03S0yS0JO:nJOH1MWkIK4Z4rRTh+nXop
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1920 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3044 1920 POWERPNT.EXE 30 PID 1920 wrote to memory of 3044 1920 POWERPNT.EXE 30 PID 1920 wrote to memory of 3044 1920 POWERPNT.EXE 30 PID 1920 wrote to memory of 3044 1920 POWERPNT.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\ali-test file.pptx"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3044
-