Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
57461ae13ec49176e760437b089d8c1c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57461ae13ec49176e760437b089d8c1c.exe
Resource
win10v2004-20231215-en
General
-
Target
57461ae13ec49176e760437b089d8c1c.exe
-
Size
2.0MB
-
MD5
57461ae13ec49176e760437b089d8c1c
-
SHA1
24d254be687226dd14f3a208393852e302f1502b
-
SHA256
d08e11b2ee12f252e24ef312f4d04a527d586af2e547333f8e6d4527c3951d44
-
SHA512
179b35740a756208a98f2d0bb1a5a16ae7c1009f963ecc2415f514c555cc12397bbff953e1211775d8bab5c90cafb4d84d3f8764cf8013c386326d446a4caead
-
SSDEEP
49152:OFUcx88PWPOpX0SF8fiymbc8V7+qwdqye+BbYNd21YcdqBASs/5yGc:O+K88uPCHzbco7+qwi5cUU/5yGc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 944 9A2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2848 57461ae13ec49176e760437b089d8c1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2344 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 944 9A2.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 944 2848 57461ae13ec49176e760437b089d8c1c.exe 3 PID 2848 wrote to memory of 944 2848 57461ae13ec49176e760437b089d8c1c.exe 3 PID 2848 wrote to memory of 944 2848 57461ae13ec49176e760437b089d8c1c.exe 3 PID 2848 wrote to memory of 944 2848 57461ae13ec49176e760437b089d8c1c.exe 3 PID 944 wrote to memory of 2344 944 9A2.tmp 2 PID 944 wrote to memory of 2344 944 9A2.tmp 2 PID 944 wrote to memory of 2344 944 9A2.tmp 2 PID 944 wrote to memory of 2344 944 9A2.tmp 2
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\57461ae13ec49176e760437b089d8c1c.docx"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2344
-
C:\Users\Admin\AppData\Local\Temp\9A2.tmp"C:\Users\Admin\AppData\Local\Temp\9A2.tmp" --splashC:\Users\Admin\AppData\Local\Temp\57461ae13ec49176e760437b089d8c1c.exe E838388275D9E2C64822470BC5380FA702BFDA0B3F4C3BB95C2F7DE598DEEC7B1B75280117EFA803BC9A61A1CFFBB19A859659E0476E27FFC9F36324791DC2D71⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:944
-
C:\Users\Admin\AppData\Local\Temp\57461ae13ec49176e760437b089d8c1c.exe"C:\Users\Admin\AppData\Local\Temp\57461ae13ec49176e760437b089d8c1c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
2.0MB
MD5715488551b10f3c41f89dd68b76a606a
SHA1e695c7fb15e520ebae5528c4302466e3368be879
SHA2568dba47944e18e2f91e1a96869bc49d6500e41e575e6bd51d8567ea5d3285150d
SHA512ad0d4f2a18ea7594b2c8bbd858342b715d51400d3efbe4dde55ddea0c5db31061b7e287e58d398266a3c006bb85877f3c58c8cd2a53643a2fb9abd3dcc679fb3