Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 01:01

General

  • Target

    cutline.ppt

  • Size

    835KB

  • MD5

    5dd713fe5df9331f0641fa850abd5d61

  • SHA1

    f66c08e26599d860cf645e8b8a828ef1660e3b1e

  • SHA256

    dbdf13e4851001e8cde22e81bd498b97a684038ea4e67851f2888aff9ada6ced

  • SHA512

    b835e99c3b4c25602af3d02796f66eb5cf8d32c165d274bfe8c667bc4113a10a8813af4f44adaa66f0ba11fb810530f978c88d8e58e4132ec7969a02c9a61064

  • SSDEEP

    24576:vKf/UKv/Z+fuolHM6VHBFXFKVJfiJC8iXhlrXAE5R:v6cKX0ukhHzQVJY8rjA+R

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\cutline.ppt"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2032
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
        2⤵
          PID:1748
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\NewSend.txt
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:2212

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2240-0-0x000000002DC01000-0x000000002DC02000-memory.dmp
        Filesize

        4KB

      • memory/2240-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2240-2-0x000000007219D000-0x00000000721A8000-memory.dmp
        Filesize

        44KB

      • memory/2240-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2240-5-0x000000007219D000-0x00000000721A8000-memory.dmp
        Filesize

        44KB