Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:07

General

  • Target

    ali-test file.pptx

  • Size

    36KB

  • MD5

    4daa434f6f4046fb0f20174cdc107ed2

  • SHA1

    d1ac48a003d9995d4c8ddf9624eed009a46f5082

  • SHA256

    232a4d8ad939d5b435fb6c89f4120fd594d0b349af2e693d813b3473a7a6c35a

  • SHA512

    e576ee0a558fcafde372975850210ef164a663537fdb3779b85a198f0ffb3507bcbc398c52728faced7c14ac53b355b344dfc3b013199ef6e4ab3e8ae33dcb96

  • SSDEEP

    768:nyk9Y+TToPyYMWPhrLq9GGgT+u7cLH0CvAY64+6BIMS0bS02S0dS04S03S0yS0JO:nJOH1MWkIK4Z4rRTh+nXop

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\ali-test file.pptx" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4224-1-0x00007FFDA3D4D000-0x00007FFDA3D4E000-memory.dmp

    Filesize

    4KB

  • memory/4224-0-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-3-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-2-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-4-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-6-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-8-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-9-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-5-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-7-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-11-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-12-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-13-0x00007FFD61660000-0x00007FFD61670000-memory.dmp

    Filesize

    64KB

  • memory/4224-14-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-10-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-16-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4224-15-0x00007FFD61660000-0x00007FFD61670000-memory.dmp

    Filesize

    64KB

  • memory/4224-42-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-41-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-44-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-43-0x00007FFD63D30000-0x00007FFD63D40000-memory.dmp

    Filesize

    64KB

  • memory/4224-45-0x00007FFDA3CB0000-0x00007FFDA3EA5000-memory.dmp

    Filesize

    2.0MB