Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 20:40

General

  • Target

    eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm

  • Size

    31KB

  • MD5

    72a4f5208fffbf6df1db5f3de168df08

  • SHA1

    d983ff33101aa44b57da0ff0e410c8eef9d2b76d

  • SHA256

    25e4642a087257cc6e1467e5e7536e0f90033425c60d47866c329607919226e6

  • SHA512

    fac8e2c429e49a85596871ec64e8e935bef017c59fc664effc2105cbe4e5636ea993b3d1b4728309e3469221938d55b95b5a08036bfc575af38d9eb77267ad1e

  • SSDEEP

    768:LlgVFy4S0JS00SneS0yS07jS0MS0bS02S03SPRDYmWlLv2Gt6j23IGC1unAiMB0m:h4q0JGEeAvhPY/

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\eicar-standard-antivirus-test-files\eicar-powerpoint-action-macro-msgbox.pptm" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4264-1-0x00007FFAA68CD000-0x00007FFAA68CE000-memory.dmp

    Filesize

    4KB

  • memory/4264-0-0x00007FFA668B0000-0x00007FFA668C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-3-0x00007FFA668B0000-0x00007FFA668C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-2-0x00007FFA668B0000-0x00007FFA668C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-4-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-7-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-6-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-8-0x00007FFA668B0000-0x00007FFA668C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-5-0x00007FFA668B0000-0x00007FFA668C0000-memory.dmp

    Filesize

    64KB

  • memory/4264-13-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-14-0x00007FFA64800000-0x00007FFA64810000-memory.dmp

    Filesize

    64KB

  • memory/4264-15-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-12-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-17-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-20-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-19-0x00007FFA64800000-0x00007FFA64810000-memory.dmp

    Filesize

    64KB

  • memory/4264-18-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-16-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-11-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-10-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-9-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-36-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-38-0x00007FFAA6830000-0x00007FFAA6A25000-memory.dmp

    Filesize

    2.0MB

  • memory/4264-37-0x00007FFAA68CD000-0x00007FFAA68CE000-memory.dmp

    Filesize

    4KB