Overview
overview
7Static
static
7c97d9d45b5...0N.exe
windows7-x64
3c97d9d45b5...0N.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/ulicense.rtf
windows7-x64
4$TEMP/ulicense.rtf
windows10-2004-x64
1AmandaRose...me.exe
windows7-x64
7AmandaRose...me.exe
windows10-2004-x64
7AmandaRose...rp.exe
windows7-x64
3AmandaRose...rp.exe
windows10-2004-x64
3SDL.dll
windows7-x64
3SDL.dll
windows10-2004-x64
3SDL_image.dll
windows7-x64
3SDL_image.dll
windows10-2004-x64
3bass.dll
windows7-x64
3bass.dll
windows10-2004-x64
3htmlayout.dll
windows7-x64
7htmlayout.dll
windows10-2004-x64
7ir50_32.dll
windows7-x64
3ir50_32.dll
windows10-2004-x64
3jpeg.dll
windows7-x64
3jpeg.dll
windows10-2004-x64
3libpng1.dll
windows7-x64
3libpng1.dll
windows10-2004-x64
3wrapper.dll
windows7-x64
7wrapper.dll
windows10-2004-x64
7zlib.dll
windows7-x64
3zlib.dll
windows10-2004-x64
3zlib1.dll
windows7-x64
3zlib1.dll
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 11:31
Behavioral task
behavioral1
Sample
c97d9d45b5d383024aa39d9fbd4295b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c97d9d45b5d383024aa39d9fbd4295b0N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$TEMP/ulicense.rtf
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$TEMP/ulicense.rtf
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
AmandaRoseTheGameOfTime.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
AmandaRoseTheGameOfTime.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
AmandaRoseTheGameOfTime.wrp.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
AmandaRoseTheGameOfTime.wrp.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
SDL.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
SDL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
SDL_image.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
SDL_image.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
bass.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
bass.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
htmlayout.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
htmlayout.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
ir50_32.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
ir50_32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
jpeg.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
jpeg.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
libpng1.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
libpng1.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
wrapper.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
wrapper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
zlib.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
zlib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
zlib1.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
zlib1.dll
Resource
win10v2004-20240709-en
General
-
Target
$TEMP/ulicense.rtf
-
Size
80KB
-
MD5
8c7f512cdb1b21e01ce120a0b2806c53
-
SHA1
f1cecc74193bb17dd59a1fea492b9144809c2445
-
SHA256
a4ecc43c48d029afa62afbac5923fc2d1b5a031190cf97f0e6953684e0f9a9f1
-
SHA512
12a673d2ea3910460132e016eb8fc21022c7134430a8c775e288df41f9fda029a97f0223892f62f62c40fcdff41d013828aba8c551f43ca97a37aef57b8bca06
-
SSDEEP
768:0eejrI4LvyVoaXMDe4MhxR+RpR+JWxR4zhc7AOB4BjLW5qojflMeI/Z3VRVx9BUZ:0hApce0Fy8Qo+6+Wp
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1768 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1768 WINWORD.EXE 1768 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1596 1768 WINWORD.EXE 30 PID 1768 wrote to memory of 1596 1768 WINWORD.EXE 30 PID 1768 wrote to memory of 1596 1768 WINWORD.EXE 30 PID 1768 wrote to memory of 1596 1768 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\ulicense.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD53cff38c6c7be82c915044a54f3b9856d
SHA1a908d0bc88e43f1ca6551365ed744d1c5cb38afe
SHA25637d11fe220000c3a73f8408130b997c00213c30e95e1fdd602c5e04948d34c57
SHA51230e0daf48436693c99d683bd2d467665da9e592faec55ae3e02f6cddc77553d778dc84e5b385b0543faa3d263973c5c9b5e6f0c2e97bb542c4b4804239dc7145