Overview
overview
10Static
static
1435eaccabd...98.exe
windows7-x64
10435eaccabd...98.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
8$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
8$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
8$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
8$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
8Analysis
-
max time kernel
98s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 03:16
Static task
static1
Behavioral task
behavioral1
Sample
435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
$TEMP/Contributing.potm
-
Size
57KB
-
MD5
58324423292aba1fe85ce884cc359575
-
SHA1
79727d862731765ef1edabb4a42f8c315d525968
-
SHA256
10353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9
-
SHA512
ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48
-
SSDEEP
1536:/UYozsxmkL/FfuHGBt2sfEmAuNBWXp2Hi0Hfd5IQIB0:15LwitBAMri0j80
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2304 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2860 2304 POWERPNT.EXE 29 PID 2304 wrote to memory of 2860 2304 POWERPNT.EXE 29 PID 2304 wrote to memory of 2860 2304 POWERPNT.EXE 29 PID 2304 wrote to memory of 2860 2304 POWERPNT.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\$TEMP\Contributing.potm"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2860
-