Analysis
-
max time kernel
101s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 06:03
Behavioral task
behavioral1
Sample
TDOMAN_CV.doc
Resource
win7-20240704-en
General
-
Target
TDOMAN_CV.doc
-
Size
59KB
-
MD5
0aa07c58cdcaf9953eacd916e4f61973
-
SHA1
17570423d85a315fffac747d3c669848824b1d5c
-
SHA256
924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb
-
SHA512
97f158e62a113e2db679203b4a0cd3cfbe65ea990c2b77dab1a204b9b2be8cdaeedf617758892503b6779464fe2466302f06fa821e41aa2d2d58d562c3d12397
-
SSDEEP
1536:RandM9Ql1gcEdJRUwlPnGoBvpgq4eJEV:8n26HgcEdJRUwVGCyqlJE
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2244 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 WINWORD.EXE 2244 WINWORD.EXE 2936 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2064 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2064 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2064 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2064 2244 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\TDOMAN_CV.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5c88cff1e47fce6adc52b4a9e21224290
SHA192ef07aadac9dad5d351912175907c3c1a99b514
SHA256e1e514297db62a6de9a4b1ca5a8875aaf76e5c3e7cd76702dde70f0ca64b19e4
SHA512968ede71339f483fc23d0b5c3b178ebcfb832a3eef5a7135adb30a4a82f7bac3da185991b6e28a37dd097a90e9f218b738c19bcd3e85d40ec051c7de21e5694c