Analysis
-
max time kernel
1797s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 18:45
Behavioral task
behavioral1
Sample
Incident_Harassment.doc
Resource
win10v2004-20240508-en
General
-
Target
Incident_Harassment.doc
-
Size
4.3MB
-
MD5
ec7e26a81b6002c53854a1769ad427a6
-
SHA1
d43501510ca909818eac2684a53c9be609075bac
-
SHA256
57bd8e8606dc579eb8190dc8882c2892ef05636f28bad0178e04c9bcbdac5995
-
SHA512
404ae68b7f2b3785a76a187d2bf173ed690de9ff903f002cebd365acb1b0f4a85fbd609fcc2f67de3e43f539f3b6584627d24ced8dcc11ff436f14e67a7b4e41
-
SSDEEP
49152:tI0ioeLdFJAJvpW4XMrCV/L75aWfpmL+n5uS/PudUUHzY:GC6dFCpWnCVz7thlZG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3016 app.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 23 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1076 WINWORD.EXE 1076 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1076 WINWORD.EXE 1076 WINWORD.EXE 1076 WINWORD.EXE 1076 WINWORD.EXE 1076 WINWORD.EXE 1076 WINWORD.EXE 1076 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3016 1076 WINWORD.EXE 98 PID 1076 wrote to memory of 3016 1076 WINWORD.EXE 98 PID 1076 wrote to memory of 3016 1076 WINWORD.EXE 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Incident_Harassment.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\app.com"C:\Users\Admin\AppData\Local\Temp\app.com"2⤵
- Executes dropped EXE
PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4184,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:81⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4364,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:81⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5bd3231011448b2d6a335032d11c12cad
SHA1b14bdeccca499668fac5049890bb7f3e5bef9537
SHA256ca066896a28840f4eccb9150adf86170d83337650d28b128cb584e7d8b178695
SHA5124fdf90883f5fde3aeb02b2ddc46c5e3cd421fe98697aca0d31b1aaea39598d2624c3339ab75a96997287c611a7d4dd8459b1c3341fe972cf049885d22c31f3de