Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 02:05
Behavioral task
behavioral1
Sample
924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb.doc
Resource
win7-20240708-en
General
-
Target
924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb.doc
-
Size
59KB
-
MD5
0aa07c58cdcaf9953eacd916e4f61973
-
SHA1
17570423d85a315fffac747d3c669848824b1d5c
-
SHA256
924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb
-
SHA512
97f158e62a113e2db679203b4a0cd3cfbe65ea990c2b77dab1a204b9b2be8cdaeedf617758892503b6779464fe2466302f06fa821e41aa2d2d58d562c3d12397
-
SSDEEP
1536:RandM9Ql1gcEdJRUwlPnGoBvpgq4eJEV:8n26HgcEdJRUwVGCyqlJE
Malware Config
Signatures
-
Sliver RAT v2 1 IoCs
resource yara_rule behavioral2/memory/4492-142-0x00007FFBF80A0000-0x00007FFBF9206000-memory.dmp SliverRAT_v2 -
Blocklisted process makes network request 5 IoCs
flow pid Process 57 4492 rundll32.exe 59 4492 rundll32.exe 60 4492 rundll32.exe 119 4492 rundll32.exe 120 4492 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 4492 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\spool\drivers\color\grandfraisupdate.dll EXCEL.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2336 WINWORD.EXE 2336 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2336 WINWORD.EXE 2336 WINWORD.EXE 2336 WINWORD.EXE 2336 WINWORD.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 2336 WINWORD.EXE 2336 WINWORD.EXE 2336 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\924f953de2ee0ba094a76e5001b8f445d5e80f37e1fa6c5943a13b971f63b0fb.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2336
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:1132
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\spool\drivers\color\grandfraisupdate.dll,update_grandfrais1⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize471B
MD5d53cb6492d223a49160013fa0944ed66
SHA197ecd670d2cdf90076be2ae3a226f1c5e006162b
SHA256d98ba52164853c886d090129e388a8b47c42f26c266b477ee8abde0a98737d28
SHA512cd5892d8c360ce30fdff331212169433e3800988e4363503ad5e1b6c8eb3e6b657fb137a44a704e12c0a3f7414bea36c9d1c42cb55ebbae9a62a778b4ad077e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize412B
MD5dd3dfe96587697c6553b37d1a95a7a62
SHA15b86c8239b95d4eecdec701524984b79402b0447
SHA256215ab76e23dd589afb1b65f03e71d7388c17ce4ca0b34f67c975bdbd48b19694
SHA512e380929921004159433cf0fa28d5f413fe6c549776c041e1753c81b21b4945dce2edb3c75460a6b73ec6849c2e564278a3ab74d3ee60e02ae9c80b2146d18452
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\ABB3849A-2BC2-4453-AC5F-317A8B5FFDDD
Filesize169KB
MD59ed821b10f65730a1648cb14daf7c741
SHA15930cce5597f924357779c57c04592c4f343b344
SHA2561d9621960871e7416f421dfaa05733ff4e09d28a679a3b257bdbb7c1a9d907d2
SHA512e691f5028461abf87804bff1614540c780427ab1884a8eeb1a6ff6403520b45ef7593a2ebb047ee852f28d87ac4ddc180d4f1c0746af5253cc72009e39245b37
-
Filesize
11KB
MD56ce182a79d1b8cc7e9d3a7f44e071c20
SHA14d245a45f7c81ef0e4e87d1df28e5e1b742bc56f
SHA256f304a21a5a342f08f18d772f2614f3758b937e188c5df2681d2560e735fbee71
SHA5123c7d025e4d0ec1e0f4ea937197b775f2049dde73ca1d9199d56c500b502736a43be2478e73b4def288281f98b403df57976e1b0d8f872af57b80d8fd65c2044d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5e3a7879c1ba03b4d9681007a54438452
SHA1f3dfd5b88513a13739d3582701bb7a1481cc032f
SHA256a18b47807de1ba8df7a135fde8dd2e89a7cf099bf065310c34d6ba5e2da993ec
SHA512c108d9ff23a0faa32afd2c8c0bda61cb00301bdd48dbb234488179b468af18d781f22263f414aca5856e3ed40ebbb2b05a50c54faff6f08413754d2100f93dc6
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5249d49e4ddea647869b2dd1ea19eade5
SHA14e8a4c2268fc671b98775bdfb14bd6639e92918b
SHA256820534f66a5ff08887dff61da48affd49371541b8e563bfda12bdf4f7e0a1ec0
SHA51215d02c83c655ce4f1896e418b59b20b18fe5aa6588df56569364d422d2f3226c5b289b4118a2dd4f8682234795c5195ef34759dd814911268b6d5685eab3c4e3
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD53d8d0f6f5cc3aa5f3a8ac4966df5e607
SHA1c7ff0b7419dc43339538a14d7ec30bef6b43a984
SHA256d52831dc22160105c50418b7656afe09f5b8533eb9c593eae40e974f8f7b02a4
SHA51220353e365163913aa3644fa8e522997b2d515a690c1778fcc6619bd82f889814f1ad264ce125cc8d966d8476b0136c7fa5101b3b67e4918f6acd19c2b8e030c7
-
Filesize
17.4MB
MD55615d287207d970765bf9bdef701eb92
SHA1a261d552ea77c96db5202b7a5f3d2fcfb3ce348b
SHA2564742371ba458a52733a2b8991ab9a24615108215ff623730403f21e7dd228a7b
SHA512f8d8633f7f189cefa15070442cfed8383fdf31d7750afa05c2a4ec142a24e23d593bd8cbad634233c9c15cf2da36fae5a4920cc1d24c81c23b3b5d0a75277f02