Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 06:03
Behavioral task
behavioral1
Sample
TDOMAN_CV.doc
Resource
win7-20240704-en
General
-
Target
TDOMAN_CV.doc
-
Size
59KB
-
MD5
0aa07c58cdcaf9953eacd916e4f61973
-
SHA1
17570423d85a315fffac747d3c669848824b1d5c
-
SHA256
924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb
-
SHA512
97f158e62a113e2db679203b4a0cd3cfbe65ea990c2b77dab1a204b9b2be8cdaeedf617758892503b6779464fe2466302f06fa821e41aa2d2d58d562c3d12397
-
SSDEEP
1536:RandM9Ql1gcEdJRUwlPnGoBvpgq4eJEV:8n26HgcEdJRUwVGCyqlJE
Malware Config
Signatures
-
Sliver RAT v2 1 IoCs
resource yara_rule behavioral2/memory/4652-144-0x00007FFED71E0000-0x00007FFED8346000-memory.dmp SliverRAT_v2 -
Blocklisted process makes network request 4 IoCs
flow pid Process 76 4652 rundll32.exe 77 4652 rundll32.exe 79 4652 rundll32.exe 123 4652 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 4652 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\spool\drivers\color\grandfraisupdate.dll EXCEL.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4000 WINWORD.EXE 4000 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 3504 EXCEL.EXE 3504 EXCEL.EXE 3504 EXCEL.EXE 3504 EXCEL.EXE 3504 EXCEL.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE 4000 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\TDOMAN_CV.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4000
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3504
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\spool\drivers\color\grandfraisupdate.dll,update_grandfrais1⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\5C33D0C2-43C3-4C53-BD2F-354932654DC9
Filesize169KB
MD5c7f7aafd16b61678071612e6db8f0a74
SHA12129c3de6ae15807aca572482a8699ede845a03a
SHA2565a241e959d125d010071b0ed9d81049d5146d17ffc22b47489d777a5fc0690be
SHA5127f67e57dfae56b4814235904e504fff685c24f9ece292dc1c88b491800694d23a5d4a209d76a983dc5b76ca97d06b3d935ecdff0a3ea2417bd674a7bf501c2f9
-
Filesize
11KB
MD5c4aaf4c24711f383050ea3da636b8683
SHA193bd8a19a56a0602d47ef0a51a7310c53540ecbe
SHA256e2300498582fbc3f3420fa126b74b8846793858189fda05add35305c93e9afbe
SHA5129a3fdf4dff4c4fd293a23c308a4656d3d7b3048a0bccf49f2b87bf1e2488724b4e0e9b8f8f0a7c746625de07fdff531b13a93e0916b0fda042655d6cb7c2045d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5deb12cf8e64f882564b5f50ae4eb8a70
SHA1a175a68be07212189508c4b63bb5e9b08c16d56c
SHA25617437d4ff15f914fe8641a09f31835ddd3db8bcf5912726df4e47c7ed790ec80
SHA512822605b402fed9ef5d8477678cc6883836d407772ab75727ec569dbd7578f1493034c20fdf1fac8bfeaf33573144d58a72677a9c21c1628a17662d78a4b6f582
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5009305d29c8853b5847a9544c99dfebf
SHA16c92cee0093582f81941f40e372c282add3cefa1
SHA2569c2c5a7cd23ae83e502fb9302a2ef5e08d450b115440ea4df7f5fecab1571cb8
SHA512dfa6cbfe05870121b808a8ddbb593eccaa73af6aa1db84b7f76acc5d6357802c4c1d69933fc0c2389a9cc53bf9628d7e16d7cacde4903e8fc14b69f1b8cdb29f
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5567e99254c8e7722ca44fb82d21c7b2d
SHA11ce3eac6328bbf9340788c2613156a5050268999
SHA25686f9daedbcaf350d4601671d80675932d5c2796a306b67336e626d0fc441b0eb
SHA512c295832dbbab13cca963ba05e01990e644ce4e59dc1188cd233cf8d5d40d2c8ddfa85990fb4ed2820e216fa2d635a635f5a1772665f5930cafe138d726057e7e
-
Filesize
17.4MB
MD55615d287207d970765bf9bdef701eb92
SHA1a261d552ea77c96db5202b7a5f3d2fcfb3ce348b
SHA2564742371ba458a52733a2b8991ab9a24615108215ff623730403f21e7dd228a7b
SHA512f8d8633f7f189cefa15070442cfed8383fdf31d7750afa05c2a4ec142a24e23d593bd8cbad634233c9c15cf2da36fae5a4920cc1d24c81c23b3b5d0a75277f02