Analysis
-
max time kernel
17s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 22:12
Behavioral task
behavioral1
Sample
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
Resource
win10v2004-20240709-en
General
-
Target
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc
-
Size
893KB
-
MD5
32248c17f968e76bbe8b90ea3be8f6f9
-
SHA1
0d5318656d07f6a071b2ca3db6a96da387873941
-
SHA256
e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6
-
SHA512
92213947b957c90aecf00df21b795018a174aa1aab38d42c4e8b93124429adc7ce1d599698834805103fd7c6f2a6bae0700305c3a692a43e1a9c74950137947b
-
SSDEEP
24576:jEIZ4wAK74NAx5KxZTBG75gdLtYkzyHtSD:j+wZ74Nx3c75OyWyHt
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1544 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 WINWORD.EXE 1544 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2912 1544 WINWORD.EXE 30 PID 1544 wrote to memory of 2912 1544 WINWORD.EXE 30 PID 1544 wrote to memory of 2912 1544 WINWORD.EXE 30 PID 1544 wrote to memory of 2912 1544 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e88b8049397c21d470396692ef208d696364e36e556690297779cf68e311a9e6.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD588af49e428980454f268003bd987ce4b
SHA126d31759a93894f5665581ec9ded5bbb0a1967de
SHA256986161dcdb4c9f3ca867b6627395359b822c973c56d299dec658577e85912fd3
SHA512d097dfb92040b5aeab8d9c120526fb18072aa4d417fdd1cdf7b0418a9369a8d7360940a6476e6b36a6f11991038007b7733846a9457bb40d5c92ffb06d5a5982