General
-
Target
elon musk.pptx
-
Size
1.1MB
-
Sample
250127-qd6ewszlfw
-
MD5
2b584370a2fb4970ae70e12a4bbaf685
-
SHA1
d57991ccd3acdd025dde7c7f066abcba50a34b87
-
SHA256
953ef8267dde192e9243306a8aab57c4779cdfba779ea0ef4185a5984f50111d
-
SHA512
e16d19dbad5256cacd3b696ee1b001e9b01359fc91a151500d98f0a8e3df91a003ea13e6d1bff80bab409f56b8e5acd5ec115ed524106016654b4a3679cd1eaa
-
SSDEEP
24576:Tk2WTsZasyuJiyV0mDUoHLgwPjvXS96H828hKlYvIQ5tNDwg//3Jc1h+NJkN5:TkKYlO3BpPTic8nwOPJwg//4+bkn
Static task
static1
Behavioral task
behavioral1
Sample
elon musk.pptx
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
elon musk.pptx
-
Size
1.1MB
-
MD5
2b584370a2fb4970ae70e12a4bbaf685
-
SHA1
d57991ccd3acdd025dde7c7f066abcba50a34b87
-
SHA256
953ef8267dde192e9243306a8aab57c4779cdfba779ea0ef4185a5984f50111d
-
SHA512
e16d19dbad5256cacd3b696ee1b001e9b01359fc91a151500d98f0a8e3df91a003ea13e6d1bff80bab409f56b8e5acd5ec115ed524106016654b4a3679cd1eaa
-
SSDEEP
24576:Tk2WTsZasyuJiyV0mDUoHLgwPjvXS96H828hKlYvIQ5tNDwg//3Jc1h+NJkN5:TkKYlO3BpPTic8nwOPJwg//4+bkn
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1