Overview
overview
10Static
static
1random.exe
windows7-x64
10random.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
1$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
1$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
1$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
3$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 15:29
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
$TEMP/Contributing.potm
-
Size
57KB
-
MD5
58324423292aba1fe85ce884cc359575
-
SHA1
79727d862731765ef1edabb4a42f8c315d525968
-
SHA256
10353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9
-
SHA512
ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48
-
SSDEEP
1536:/UYozsxmkL/FfuHGBt2sfEmAuNBWXp2Hi0Hfd5IQIB0:15LwitBAMri0j80
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2808 2692 POWERPNT.EXE 31 PID 2692 wrote to memory of 2808 2692 POWERPNT.EXE 31 PID 2692 wrote to memory of 2808 2692 POWERPNT.EXE 31 PID 2692 wrote to memory of 2808 2692 POWERPNT.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Contributing.potm"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2808
-