Analysis
-
max time kernel
101s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
ec988abefad799b3a5cbda4504edc050N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec988abefad799b3a5cbda4504edc050N.exe
Resource
win10v2004-20240709-en
General
-
Target
ec988abefad799b3a5cbda4504edc050N.exe
-
Size
467KB
-
MD5
ec988abefad799b3a5cbda4504edc050
-
SHA1
d5a99985eef10ed2bee46f2ef174193c32bcb8f4
-
SHA256
83e66109b18d85aaa3797665843ae6664225f0049e8e9430daabfa8c1c0903d7
-
SHA512
8e7ac3e4a905951ecde45187e18232a4bc717004dfbbecdbb216d61d489dc56a3f8e0814792349495def5bc052137cd6abdcde964df2e088f6d819daed10004a
-
SSDEEP
6144:mSyAAwKrd01YZW9mhO81rtfTWZGy1Q34HOSR4R5DLhFfUG3xpORuuW3XE+rf+QxB:PYO1QIubR5RF/3rORuuoXEOrkC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 FA46.tmp -
Loads dropped DLL 1 IoCs
pid Process 2684 ec988abefad799b3a5cbda4504edc050N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec988abefad799b3a5cbda4504edc050N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA46.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2756 FA46.tmp -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2812 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 FA46.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 WINWORD.EXE 2812 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2756 2684 ec988abefad799b3a5cbda4504edc050N.exe 30 PID 2684 wrote to memory of 2756 2684 ec988abefad799b3a5cbda4504edc050N.exe 30 PID 2684 wrote to memory of 2756 2684 ec988abefad799b3a5cbda4504edc050N.exe 30 PID 2684 wrote to memory of 2756 2684 ec988abefad799b3a5cbda4504edc050N.exe 30 PID 2756 wrote to memory of 2812 2756 FA46.tmp 31 PID 2756 wrote to memory of 2812 2756 FA46.tmp 31 PID 2756 wrote to memory of 2812 2756 FA46.tmp 31 PID 2756 wrote to memory of 2812 2756 FA46.tmp 31 PID 2812 wrote to memory of 2248 2812 WINWORD.EXE 33 PID 2812 wrote to memory of 2248 2812 WINWORD.EXE 33 PID 2812 wrote to memory of 2248 2812 WINWORD.EXE 33 PID 2812 wrote to memory of 2248 2812 WINWORD.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe"C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\FA46.tmp"C:\Users\Admin\AppData\Local\Temp\FA46.tmp" --pingC:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe 3353F3862BD48D61A6D143AA5E09AB4E07B5D55EF60FB57FA54D516356D2E323EA294E83C2F4768AD485703083DC528F30515C353E2B5152F8C36573F1D833F42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.doc"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2248
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD559975947e6db92e743655ebdf2e3c495
SHA15e967d85a4df28f9fed485156919a14fb411d18d
SHA25683c9df8884ffd5b51bdbdb9314d587477ecf50c3144c6c230ded3a3041f24e05
SHA5121cdc533bcc9bf50c69dd3a516c4fff8f24cf2ba9ecf1df885c12d4f459727b63c2d7f1a388ac0a4ac2fe59fe1bd5f5cb623001c736df33490fb245e06d7af692
-
Filesize
19KB
MD5460e3cf4e318b63a3d7e41050a0064e3
SHA1901628cf58950f0adff8d51f533e9ef357c8ca26
SHA2566129d027c3b61832c54fb7138a382ab7563c8df5be2eace38f24b2ecf29ec5b4
SHA5121ce28e5bd6f1dce43d7ec873ede1bbde616231920e9cb6232976d9598336dee362045f9777a723c3c4beafcd3c8897d09f5f9c2b43bdb40cc40d88be17a1959d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
467KB
MD5706707f82f2e53dff055e396087ad8e6
SHA1e136f44bde30ec5e059118ba72559f8c919be234
SHA256f53c0a7092c80716842605d0f96ad5966d58e73301ba2b0f7daa13a69c60ed3c
SHA512d7425a90a12f55af8b4230b0737e99de9d94c96407bc0cf77122898fb1a3ab71768f19137d8c02de18555ed29b39bfc31b826221ef7d9fe1b612de8447dc93df