Overview
overview
10Static
static
19YWF7_random.exe
windows7-x64
109YWF7_random.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
3$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
3$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
3$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
1$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
1Analysis
-
max time kernel
99s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 18:07
Static task
static1
Behavioral task
behavioral1
Sample
9YWF7_random.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9YWF7_random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
$TEMP/Cm.potm
-
Size
88KB
-
MD5
ea946bdf2f84accd7dfef4aadd7ceba0
-
SHA1
2b3e2257cb4132924adb6ffdf79c64ecd2e1bde7
-
SHA256
2625c1467ac13734c7ac9d6440113895a5166f913fb6a48ccc3b1b479d1cbda3
-
SHA512
7f3f9ca44c1ffec0f0b6b419d043c2f8547002e0d2139848787d077976591f01a9e77b960d95ae886ec4d9030293740d2f551851b053e827ffb8a00c6c810953
-
SSDEEP
1536:FBEWBgbj9gAmdo5kJjAGEER3tSzZ8ezFvt7KbyjPeC5M6WQRD1+3KmvvyCUS0T:FBnBMj9gAmdfjAAR3tSzlt7k2mC5MNiZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2328 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2328 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2820 2328 POWERPNT.EXE 29 PID 2328 wrote to memory of 2820 2328 POWERPNT.EXE 29 PID 2328 wrote to memory of 2820 2328 POWERPNT.EXE 29 PID 2328 wrote to memory of 2820 2328 POWERPNT.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Cm.potm"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2820
-