Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 14:52
Behavioral task
behavioral1
Sample
140000000.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
140000000.exe
Resource
win10v2004-20240709-en
General
-
Target
140000000.exe
-
Size
80KB
-
MD5
0d1c013939f390023fb0a98f006171a4
-
SHA1
30553889a1e4d8d180afa5adacfde37b5d78488a
-
SHA256
b8ff05612476e6f6ce429419adfc38fe71da319bafb3ba39bd72ccde95ab2dab
-
SHA512
184884f77c8a6e94a4c106f745977f8810f2a9d286cfb1010f6a015956ee8c1be37c66d9fbea8570533d691c7d3d9214440d5169aa6d973a4c345233d8917e46
-
SSDEEP
768:k3KIOWOiLVYVHSXgspu/aMxuyr3HT+WVXjS6c54GzzNUTf8egoKU:k9OiJYVQ/9k3H9Xyuszwf8egoKU
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2400 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 140000000.exe 2116 140000000.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 WINWORD.EXE 2400 WINWORD.EXE 2400 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\140000000.exe"C:\Users\Admin\AppData\Local\Temp\140000000.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\FindUnblock.dotm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD584c0d4f5175c08eb8ff77ed23a297022
SHA1ac590c8e9bebf8734a4dfd59f274b483b63c0083
SHA256c793e8d4b7b0ebc7645f9346dbe5ca46e080076279288ba23c042dce4e679e15
SHA512fb7827cb20dc80f2bf88233bc5dd40a203e9f15a8d5bd48302c6e9148be89b31e63a3d1ed8ddf03d3ba4a8cbf29b925feb3c1963ae84631ac9d0a1cec06fcdde