Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:34
Static task
static1
Behavioral task
behavioral1
Sample
112f03f4f459613b04f3687bda73adb0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
112f03f4f459613b04f3687bda73adb0.exe
Resource
win10v2004-20231215-en
General
-
Target
112f03f4f459613b04f3687bda73adb0.exe
-
Size
2.0MB
-
MD5
112f03f4f459613b04f3687bda73adb0
-
SHA1
080fab9f23b521fb34d24bbacb5ab0be69fd491f
-
SHA256
25466a99fe4be639cbceb8edcb5f63440ada94ec8d428cf186bc2a6ac5a79442
-
SHA512
f3764db06bfca61518b04ab25a2a7ae8c06dedf6e2c414994833f628a80c2003628f82e6917df31281055114a20ffe2d022c09361781c0666a0ec97cf83fe048
-
SSDEEP
49152:OFUcx88PWPOpX0SFlvEZvgVmyh59T0XM4n2kVqmn+IDRudyGc:O+K88uPCH8vRi9TYoYRDYdyGc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 4376.tmp -
Loads dropped DLL 1 IoCs
pid Process 2488 112f03f4f459613b04f3687bda73adb0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2728 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 4376.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2016 2488 112f03f4f459613b04f3687bda73adb0.exe 28 PID 2488 wrote to memory of 2016 2488 112f03f4f459613b04f3687bda73adb0.exe 28 PID 2488 wrote to memory of 2016 2488 112f03f4f459613b04f3687bda73adb0.exe 28 PID 2488 wrote to memory of 2016 2488 112f03f4f459613b04f3687bda73adb0.exe 28 PID 2016 wrote to memory of 2728 2016 4376.tmp 29 PID 2016 wrote to memory of 2728 2016 4376.tmp 29 PID 2016 wrote to memory of 2728 2016 4376.tmp 29 PID 2016 wrote to memory of 2728 2016 4376.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\112f03f4f459613b04f3687bda73adb0.exe"C:\Users\Admin\AppData\Local\Temp\112f03f4f459613b04f3687bda73adb0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\4376.tmp"C:\Users\Admin\AppData\Local\Temp\4376.tmp" --splashC:\Users\Admin\AppData\Local\Temp\112f03f4f459613b04f3687bda73adb0.exe 69FADB90FD7DEEF0E97C9A726A5BC8316E7664019C65A0B26D69B8C1261583EE7BFAD45FE790FF584BEA6047124824049B65469129A99F9D7F13FC57536ADE022⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\112f03f4f459613b04f3687bda73adb0.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
263KB
MD5be7d5098924f69865200b34a78f11b52
SHA19d6decfb8e70e774d894b2a2e6e4ee058dd3e04c
SHA256f092efce9c224a7e9c05e5390c8aa86c33dc00033834742e55577308a30504bd
SHA51296cab1f4dcf686c4f004279135bc37dfcbdcb1ee4785d6209ceae0b034044f19efebdbe69c4494d0e5f644b9987b2dfd9677b2f0efda860ecc0271cb88aa9e68
-
Filesize
473KB
MD5aac5dab33c0a615df913b29f4d0270a6
SHA1d4de86452272fbedce6f36243c0525f89d6a35f5
SHA2568513cef0407c5185b7b3523f483d68072f062b942ec07ccf32703289b8318819
SHA51201ed48e74397895678469f83a8f74b8816b11bc1b2498e0c6e207c690f11722459d77fd3c271bf11c2af4176320c2781e45495311c9a31aa853a95a03e5e188f