Analysis
-
max time kernel
7s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
4b276bf3503cb47bd21fb8d77823a4a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b276bf3503cb47bd21fb8d77823a4a7.exe
Resource
win10v2004-20231222-en
General
-
Target
4b276bf3503cb47bd21fb8d77823a4a7.exe
-
Size
33KB
-
MD5
4b276bf3503cb47bd21fb8d77823a4a7
-
SHA1
bf08d1a12076ba12c2b43193d6f0bdb1d1c0ff22
-
SHA256
76fb15f2ae74bcc7b6f864f7568a75d080c504539904aa91a60dbe3bb1abecb2
-
SHA512
9a3d2cb3c5a8e4a5269ba21066814114a90f1970475b21469805511e9b8abcff909dbcf476811a50c66f48f218fab41357de3d824a6b66406ee162d950eda7bd
-
SSDEEP
768:U+ISmCcYsOy6LGkD19/wwlP8/DXfvbOUDp8leGs3nStS0v:U+TVcADLGkD19/wwqrX97GO2t
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2600 2736 svchost.exe 28 -
Loads dropped DLL 1 IoCs
pid Process 2416 4b276bf3503cb47bd21fb8d77823a4a7.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 4b276bf3503cb47bd21fb8d77823a4a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b276bf3503cb47bd21fb8d77823a4a7.exe"C:\Users\Admin\AppData\Local\Temp\4b276bf3503cb47bd21fb8d77823a4a7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding1⤵
- Modifies Internet Explorer settings
PID:2736 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Process spawned unexpected child process
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD51115629b3629d395579a66a1b2ad2697
SHA17421a54e3d35309c804503441525d51bcd82a8bc
SHA2569e635f518975d1cfaec0334264395043b7539faab201693bb795de7d24ce929b
SHA5128d535c4140356b419f5eeac4a21a38ed781e4c34436db4e833db0e75249acbe9ce2aaa38dc1a2ad9261284b9e04f459809451322377ed9af05afae888b05d1ec
-
Filesize
20KB
MD5699bfa9503ddb0d74bc019a9c16ea636
SHA13b929de12de62b81a57daad5c8b34fa8170d36b5
SHA25632bbbd5084e7f0b483a997a3f2fbb9c5ee1744cef5f5f26cf7b11b2ff88bd60e
SHA512e133d3ada07d18165d6e76e18baa60e4dae922f650e6b4b42306b5a44b1f24b1e95298e8905028abf200264ae1116da198f3665eb7bae35eea8fb0f7e61b02a6