Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 22:42
Behavioral task
behavioral1
Sample
af2da35bd05abcc73ce04f9ee775209e6831a4a3df72c9e8531d35e36d84f84f.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
af2da35bd05abcc73ce04f9ee775209e6831a4a3df72c9e8531d35e36d84f84f.doc
Resource
win10v2004-20240709-en
General
-
Target
af2da35bd05abcc73ce04f9ee775209e6831a4a3df72c9e8531d35e36d84f84f.doc
-
Size
892KB
-
MD5
fc0ac133bbf94c2080a6ed2f06f32d31
-
SHA1
403cf365bf5672e1df7d0ced3a2603ce87a54e17
-
SHA256
af2da35bd05abcc73ce04f9ee775209e6831a4a3df72c9e8531d35e36d84f84f
-
SHA512
94f7cbaf996f332265315b78f8d68210b530917883936041eff1b07c24dee3ca656c1ece4036554642c13a6f42e1976ebda10a620e5815ce15ac12c56f1b2e53
-
SSDEEP
24576:cEIZ4wAK74NAx5KxZTBG75gdYtYkzyHl4:c+wZ74Nx3c75OpWyHl
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2228 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2228 WINWORD.EXE 2228 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3012 2228 WINWORD.EXE 30 PID 2228 wrote to memory of 3012 2228 WINWORD.EXE 30 PID 2228 wrote to memory of 3012 2228 WINWORD.EXE 30 PID 2228 wrote to memory of 3012 2228 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\af2da35bd05abcc73ce04f9ee775209e6831a4a3df72c9e8531d35e36d84f84f.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD588af49e428980454f268003bd987ce4b
SHA126d31759a93894f5665581ec9ded5bbb0a1967de
SHA256986161dcdb4c9f3ca867b6627395359b822c973c56d299dec658577e85912fd3
SHA512d097dfb92040b5aeab8d9c120526fb18072aa4d417fdd1cdf7b0418a9369a8d7360940a6476e6b36a6f11991038007b7733846a9457bb40d5c92ffb06d5a5982