Analysis
-
max time kernel
47s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
e6f14159a58d5f479fccfcd91eaad285f93d0f35e872ea4deadf67c4f252df28.docm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e6f14159a58d5f479fccfcd91eaad285f93d0f35e872ea4deadf67c4f252df28.docm
Resource
win10v2004-20240508-en
General
-
Target
e6f14159a58d5f479fccfcd91eaad285f93d0f35e872ea4deadf67c4f252df28.docm
-
Size
83KB
-
MD5
62a55031576a80e9eee504512c043634
-
SHA1
7f55a58324f6da14bfbaf9d07d88587c7146a0c3
-
SHA256
e6f14159a58d5f479fccfcd91eaad285f93d0f35e872ea4deadf67c4f252df28
-
SHA512
5fc664ddaacb6dc99d713fe042a0a67a90b7b2e82f1eae7e9c05de8288656bdaba8d067ed9403a935a137b78aa58d9af8995436b04ec83f97810bc3b7651697f
-
SSDEEP
1536:Ex+WqQuctgd6mVfv/wnmAgDO+KJxAQN+DHC9S3AGcf+UXZb8ayHZOiqOXCla:q+X8YVn/7dKJW2n92A1+WYoLOCE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
radC2847.tmp.exepid process 4032 radC2847.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4248 WINWORD.EXE 4248 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4248 WINWORD.EXE 4248 WINWORD.EXE 4248 WINWORD.EXE 4248 WINWORD.EXE 4248 WINWORD.EXE 4248 WINWORD.EXE 4248 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4248 wrote to memory of 4032 4248 WINWORD.EXE radC2847.tmp.exe PID 4248 wrote to memory of 4032 4248 WINWORD.EXE radC2847.tmp.exe PID 4248 wrote to memory of 4032 4248 WINWORD.EXE radC2847.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e6f14159a58d5f479fccfcd91eaad285f93d0f35e872ea4deadf67c4f252df28.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\radC2847.tmp.exe"C:\Users\Admin\AppData\Local\Temp\radC2847.tmp.exe"2⤵
- Executes dropped EXE
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
72KB
MD537a56fa4684982db133e75fa6dc315b2
SHA1b0275183285bf582c3ce74225a5cb8c8ecead410
SHA256691d7fac9316038538dcc27fdf137be11379ee06918f9f52d23dc02a1568d850
SHA5124a68647ba96299ab0d828c5bb195064eb74cb09d46e4ff9261c231129de6799998b37f97292c6b63baea1686df823a4e645151a46263dfeed23369e036c0af1d