Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe
Resource
win7-20220901-en
General
-
Target
dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe
-
Size
466KB
-
MD5
f69e136db9264350a915c78e9c5f4c5c
-
SHA1
0abcc3593f61de014239a416f65485849091a68c
-
SHA256
dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03
-
SHA512
a401b31dbbeb6de10cf6a1bddbeb758b501ab17150e6f56596cbf96ba68de33c5fb952af0287e858f8ffa5803a5de1566088919aacfa0263f52808cc3c0a4a14
-
SSDEEP
12288:M1dlZo5yOPPCWvwxJCpgb1ljkeJU0cq8392cgtBnLbjU9aE7ZCwY:M1dlZo5r3hXpeXH9cB9ngtlGY
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/392-71-0x0000000000400000-0x0000000001400000-memory.dmp netwire behavioral1/memory/392-74-0x0000000000400000-0x0000000001400000-memory.dmp netwire behavioral1/memory/392-75-0x0000000000402196-mapping.dmp netwire behavioral1/memory/392-79-0x0000000000400000-0x0000000001400000-memory.dmp netwire behavioral1/memory/392-80-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/392-88-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
saa.exesaa.exepid process 976 saa.exe 392 saa.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
saa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17C8GX2F-CX25-S40Y-L4I1-7NDW4MPVQ8FP}\StubPath = "\"C:\\saa\\saa.exe\"" saa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17C8GX2F-CX25-S40Y-L4I1-7NDW4MPVQ8FP} saa.exe -
Processes:
resource yara_rule \saa\saa.exe upx \saa\saa.exe upx C:\saa\saa.exe upx behavioral1/memory/976-62-0x0000000000400000-0x0000000000519000-memory.dmp upx C:\saa\saa.exe upx C:\saa\saa.exe upx -
Loads dropped DLL 2 IoCs
Processes:
dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exepid process 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
saa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ saa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nets = "C:\\saa\\saa.exe" saa.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
saa.exedescription pid process target process PID 976 set thread context of 392 976 saa.exe saa.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 824 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
saa.exepid process 976 saa.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
saa.exeWINWORD.EXEpid process 976 saa.exe 824 WINWORD.EXE 824 WINWORD.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exesaa.exeWINWORD.EXEdescription pid process target process PID 852 wrote to memory of 976 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe saa.exe PID 852 wrote to memory of 976 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe saa.exe PID 852 wrote to memory of 976 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe saa.exe PID 852 wrote to memory of 976 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 976 wrote to memory of 392 976 saa.exe saa.exe PID 852 wrote to memory of 824 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe WINWORD.EXE PID 852 wrote to memory of 824 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe WINWORD.EXE PID 852 wrote to memory of 824 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe WINWORD.EXE PID 852 wrote to memory of 824 852 dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe WINWORD.EXE PID 824 wrote to memory of 2004 824 WINWORD.EXE splwow64.exe PID 824 wrote to memory of 2004 824 WINWORD.EXE splwow64.exe PID 824 wrote to memory of 2004 824 WINWORD.EXE splwow64.exe PID 824 wrote to memory of 2004 824 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe"C:\Users\Admin\AppData\Local\Temp\dd9582b4545f6e3213f9578fa5de451932a79ab1cdcf343f5a031dda1ecfce03.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\saa\saa.exe"C:\saa\saa.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\saa\saa.exeC:\saa\saa.exe3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\saa\Document.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\saa\Document.rtfFilesize
34KB
MD550bac2dd431d23253012f045b387107a
SHA1d92a3a3bc8e15280aeab2c8980a92fbeb591efa5
SHA256621604d0c4d547f143f0d04c79c4dcb6e40d6e6e23159903611e38e684463883
SHA512ec5b1c6e6ef3f31ed6baadb2edc2b5a80aa2782bc1f031a95a583eff677940b73b3a97c12de21bee0c1691b1f8ae3ae9fa4fb5f0b967a8eb10d6266c65fd3890
-
C:\saa\saa.exeFilesize
400KB
MD5732a3bc1a91b0f0e0908a275de5cac0c
SHA12d747605ac08d861478a2efc0497d3d20ac49cf6
SHA2568b2af2a3425ee5e9d24162714aece65d47008c7dd2c89b3beb41e88c8235c912
SHA512a7e176bf92dc2572d06252e0c3165d3eebd9a8bda2afecfd491f308db54a88614b97646ad15eb9478d3312fc49e19f4badcfbac1d643e1905f2687e34c3be6f3
-
C:\saa\saa.exeFilesize
400KB
MD5732a3bc1a91b0f0e0908a275de5cac0c
SHA12d747605ac08d861478a2efc0497d3d20ac49cf6
SHA2568b2af2a3425ee5e9d24162714aece65d47008c7dd2c89b3beb41e88c8235c912
SHA512a7e176bf92dc2572d06252e0c3165d3eebd9a8bda2afecfd491f308db54a88614b97646ad15eb9478d3312fc49e19f4badcfbac1d643e1905f2687e34c3be6f3
-
C:\saa\saa.exeFilesize
400KB
MD5732a3bc1a91b0f0e0908a275de5cac0c
SHA12d747605ac08d861478a2efc0497d3d20ac49cf6
SHA2568b2af2a3425ee5e9d24162714aece65d47008c7dd2c89b3beb41e88c8235c912
SHA512a7e176bf92dc2572d06252e0c3165d3eebd9a8bda2afecfd491f308db54a88614b97646ad15eb9478d3312fc49e19f4badcfbac1d643e1905f2687e34c3be6f3
-
\saa\saa.exeFilesize
400KB
MD5732a3bc1a91b0f0e0908a275de5cac0c
SHA12d747605ac08d861478a2efc0497d3d20ac49cf6
SHA2568b2af2a3425ee5e9d24162714aece65d47008c7dd2c89b3beb41e88c8235c912
SHA512a7e176bf92dc2572d06252e0c3165d3eebd9a8bda2afecfd491f308db54a88614b97646ad15eb9478d3312fc49e19f4badcfbac1d643e1905f2687e34c3be6f3
-
\saa\saa.exeFilesize
400KB
MD5732a3bc1a91b0f0e0908a275de5cac0c
SHA12d747605ac08d861478a2efc0497d3d20ac49cf6
SHA2568b2af2a3425ee5e9d24162714aece65d47008c7dd2c89b3beb41e88c8235c912
SHA512a7e176bf92dc2572d06252e0c3165d3eebd9a8bda2afecfd491f308db54a88614b97646ad15eb9478d3312fc49e19f4badcfbac1d643e1905f2687e34c3be6f3
-
memory/392-75-0x0000000000402196-mapping.dmp
-
memory/392-79-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/392-88-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/392-64-0x00000000001B0000-0x00000000002AA000-memory.dmpFilesize
1000KB
-
memory/392-66-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/392-67-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/392-69-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/392-80-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/392-71-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/392-74-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/824-83-0x000000006FBB1000-0x000000006FBB3000-memory.dmpFilesize
8KB
-
memory/824-93-0x0000000070B9D000-0x0000000070BA8000-memory.dmpFilesize
44KB
-
memory/824-81-0x0000000000000000-mapping.dmp
-
memory/824-82-0x0000000072131000-0x0000000072134000-memory.dmpFilesize
12KB
-
memory/824-89-0x0000000070B9D000-0x0000000070BA8000-memory.dmpFilesize
44KB
-
memory/824-84-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/824-86-0x0000000070B9D000-0x0000000070BA8000-memory.dmpFilesize
44KB
-
memory/824-92-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/852-60-0x00000000032E0000-0x00000000033F9000-memory.dmpFilesize
1.1MB
-
memory/852-54-0x0000000074E41000-0x0000000074E43000-memory.dmpFilesize
8KB
-
memory/852-61-0x00000000032E0000-0x00000000033F9000-memory.dmpFilesize
1.1MB
-
memory/976-72-0x0000000000220000-0x0000000000224000-memory.dmpFilesize
16KB
-
memory/976-57-0x0000000000000000-mapping.dmp
-
memory/976-62-0x0000000000400000-0x0000000000519000-memory.dmpFilesize
1.1MB
-
memory/2004-90-0x0000000000000000-mapping.dmp
-
memory/2004-91-0x000007FEFB641000-0x000007FEFB643000-memory.dmpFilesize
8KB