Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Vesture_WW2_PD (3).docx
Resource
win11-20240214-en
General
-
Target
Vesture_WW2_PD (3).docx
-
Size
333KB
-
MD5
b280ef1e61e0eb8789dc36086aa6980e
-
SHA1
6cace6c59d0c331743af3855d1d4bd6b48be9c69
-
SHA256
53d8bef4d0952cde8177b1f9933660f27681888b603a0cc5b6bc27b72cea531f
-
SHA512
3d51495d18570a98cbbab74addb7fa99d5e41a488a98989c1b9eca4363579ddedd8b4311d80faa0439e334aa339322b21d54c3e5612992bd94b1c0a76025415d
-
SSDEEP
6144:yTkI/wkQ/CtLhzHJ1fePtLhKysE8I/Nvt8gCPIBviYUz/Mt2u:AbokQiLhTJFePthsas46fiP
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 5072 WINWORD.EXE 5072 WINWORD.EXE 4628 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4628 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3176 taskmgr.exe Token: SeSystemProfilePrivilege 3176 taskmgr.exe Token: SeCreateGlobalPrivilege 3176 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe 3176 taskmgr.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 5072 WINWORD.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE 4628 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Vesture_WW2_PD (3).docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5072
-
C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4628
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F5069F19-EF99-4F92-83A1-56B90FEFB9D2
Filesize159KB
MD52a0aeb8b9e51c2ee87654bcd485140a0
SHA11fc68e061ca5e76ba5c9b10e74f4f1958cc28b89
SHA25665466a56e528b460ef2d9e71800f83c2fc3f5215cfc28d1c9e9816e332143d26
SHA512360d6fb3acf48e933229b90e42afe24d9b228704e3a61079d5976a97db95ac133ba06140fcc2d45e76921291ba0e2dbfd52794de7f0ecf6b94544286bedff598
-
Filesize
76B
MD50f8eb2423d2bf6cb5b8bdb44cb170ca3
SHA1242755226012b4449a49b45491c0b1538ebf6410
SHA256385347c0cbacdd3c61d2635fbd390e0095a008fd75eeb23af2f14f975c083944
SHA512a9f23a42340b83a2f59df930d7563e8abd669b9f0955562cd3c2872e2e081f26d6d8b26357972b6d0423af05b2392bddbb46da769788e77fd169b3264ff53886
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
357KB
MD51acfa9857b6bc9d2a2014c935df13341
SHA10baa355c34568d135852d0fc0b2395e571b349f9
SHA256b012f153968a81b91a0176a1dd7a9aff5ba6c3acad61abcecf0a5b87667fef22
SHA5126cad69e399a8a27e6540b485d95a64ba0326a5addecf8183b430826cbb76b4a4722c2a6d22b6624efca74e9decc00d54bb58dfe8ed430db8f976f890996bda21