Analysis
-
max time kernel
22s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 21:01
Behavioral task
behavioral1
Sample
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc
Resource
win10v2004-20240709-en
General
-
Target
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc
-
Size
892KB
-
MD5
eca53d1189d86e35b7567fa2f7b94352
-
SHA1
692e2c3d905d545ae6688c8982ff3e5b7176c42f
-
SHA256
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667
-
SHA512
4df485a9bb729c942d87066783f802427d68d161ae73fa1bace752a82b8d2830be5acff22e61bec1cdafa1ff0608d67ad0288adeb31d0a196564c25fef88d417
-
SSDEEP
24576:kEIZ4wAK74NAx5KxZTBG75gdKtYkzyHxhL:k+wZ74Nx3c75O3WyHx
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 656 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 656 WINWORD.EXE 656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 2532 656 WINWORD.EXE 29 PID 656 wrote to memory of 2532 656 WINWORD.EXE 29 PID 656 wrote to memory of 2532 656 WINWORD.EXE 29 PID 656 wrote to memory of 2532 656 WINWORD.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD588af49e428980454f268003bd987ce4b
SHA126d31759a93894f5665581ec9ded5bbb0a1967de
SHA256986161dcdb4c9f3ca867b6627395359b822c973c56d299dec658577e85912fd3
SHA512d097dfb92040b5aeab8d9c120526fb18072aa4d417fdd1cdf7b0418a9369a8d7360940a6476e6b36a6f11991038007b7733846a9457bb40d5c92ffb06d5a5982