Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
eeyebootroot.ppt
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
eeyebootroot.ppt
Resource
win10v2004-20241007-en
4 signatures
150 seconds
General
-
Target
eeyebootroot.ppt
-
Size
185KB
-
MD5
75f6e84e0f13c68c411ff04ff1df5084
-
SHA1
44dca237071e197d33bc62530886e54506d9aa8e
-
SHA256
30f340d93b25908c3d4b5977707d4e971388eef58b762294f0a94c6c4ce9b15d
-
SHA512
7a7ab5e699815934d85ebe8ac04c84d52c86de31cde2b7646fcebde0bbfb131c52dfe29c155df95fcc5e8a93a093ea6387ce26fbdfcc26d65fc21d74032752d7
-
SSDEEP
3072:Y4r3nDDRFy6nY9gO1GUHKN8lHxPDsQfAD:PnxY9gYGU+OxPDR
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2828 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1328 2828 POWERPNT.EXE 28 PID 2828 wrote to memory of 1328 2828 POWERPNT.EXE 28 PID 2828 wrote to memory of 1328 2828 POWERPNT.EXE 28 PID 2828 wrote to memory of 1328 2828 POWERPNT.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\eeyebootroot.ppt"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1328
-