Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe
Resource
win10v2004-20240508-en
General
-
Target
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe
-
Size
664KB
-
MD5
3d244b4bdbdef6b5932daeffcff956c1
-
SHA1
f9fba06b0a7d9cae9479e85cdf3f1f088bca6b24
-
SHA256
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42
-
SHA512
49ce925e718033b4de7962a2c3e24466aef94112070b29e95c00374b92d6ffa4d942473ac3eec5faaaef92b1d83ef563be087c38157e7f89399b255766200788
-
SSDEEP
12288:pYIW0p98Oh8P7h8Kn4AqMotLv8tuqZNLlgjOETn4/5BWpUohOqH:dW298E8uKTs8bZNLlgjOETn4/5BWpUoD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
13CF.tmppid process 2608 13CF.tmp -
Loads dropped DLL 1 IoCs
Processes:
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exepid process 2856 4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2548 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
13CF.tmppid process 2608 13CF.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
WINWORD.EXEpid process 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe13CF.tmpdescription pid process target process PID 2856 wrote to memory of 2608 2856 4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe 13CF.tmp PID 2856 wrote to memory of 2608 2856 4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe 13CF.tmp PID 2856 wrote to memory of 2608 2856 4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe 13CF.tmp PID 2856 wrote to memory of 2608 2856 4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe 13CF.tmp PID 2608 wrote to memory of 2548 2608 13CF.tmp WINWORD.EXE PID 2608 wrote to memory of 2548 2608 13CF.tmp WINWORD.EXE PID 2608 wrote to memory of 2548 2608 13CF.tmp WINWORD.EXE PID 2608 wrote to memory of 2548 2608 13CF.tmp WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe"C:\Users\Admin\AppData\Local\Temp\4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\13CF.tmp"C:\Users\Admin\AppData\Local\Temp\13CF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.exe 5756F63D8E6FFAFCF453FBC710C0CA0E5709105D276509C54E766469CF080ED99F8E69E98A8E6DFF180AF5290F9C9FEB4A6112E8C98E51AD16966130E7444C892⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
664KB
MD5a6341bf7875f3d9ff019da0dd094e5d9
SHA18023217aaa130ae08de227f6f6910d7ff8adaebc
SHA256da745e23485b713a4196c1ba4e58f7a1f65d1e1f76c348ac0b7a76bf2f9d798d
SHA512d1ad4a36c24d17136bb14bb8a293101da56d5e33fa378fdac0c69fd1fdf54ecb38e15b1b538903a84e51f17e74a8500e99270fb9b064d24341984356020e2767
-
C:\Users\Admin\AppData\Local\Temp\4dfc9f8e7cf7a045edd0f51a72881770a0f05bf63be6f81c2a6e7afd0a10bd42.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a