Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
Decoding Shakespeare’s.pptx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Decoding Shakespeare’s.pptx
Resource
win10v2004-20250314-en
General
-
Target
Decoding Shakespeare’s.pptx
-
Size
26.7MB
-
MD5
c0d157a70f8da22f3606392c60419bca
-
SHA1
7ccca32337a71c5c3429bcff29771bf070625cd3
-
SHA256
ab9741d643dd577756def8f497aa23aa95ecb9833f6433ac4a3d5c79bf2c39e4
-
SHA512
aa0d8e46e40890607a29ab36fdc6894bba9e18ad818dc5e5fa8e2a2e8139dc10e88e810269989435781fcf73caf8e336c78e9e182e4d550b888caba64134f069
-
SSDEEP
393216:V+DjyULN9bBGWNMbD+ascJIxXkLjaJX85TjjAw4+MpajxbZipkMmTH0jZSmKdEku:V8PN9NTeuC8UkX1pEBIpbu4gBdSDN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2516 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 3064 2516 POWERPNT.EXE 30 PID 2516 wrote to memory of 3064 2516 POWERPNT.EXE 30 PID 2516 wrote to memory of 3064 2516 POWERPNT.EXE 30 PID 2516 wrote to memory of 3064 2516 POWERPNT.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Decoding Shakespeare’s.pptx"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3064
-