Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
062eecfedbfe097c7a42f699a95b7b00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
062eecfedbfe097c7a42f699a95b7b00N.exe
Resource
win10v2004-20240730-en
General
-
Target
062eecfedbfe097c7a42f699a95b7b00N.exe
-
Size
1.6MB
-
MD5
062eecfedbfe097c7a42f699a95b7b00
-
SHA1
56abd214cbc60748a4ac539bc4f7b00f625b5cf6
-
SHA256
c48c69c6d7ea357ed5372d0f648848787baa3ebf36ca8b8c565833f02af886e0
-
SHA512
1c9951d53b0ba871af91e7f27b9ef00a9b0a8420ec83a5cdcda17ea784e20a75924be323214461e59d10ce9c7a4217ed0f40dda657d7be845e3ffa69f7a2ef13
-
SSDEEP
24576:sLILY8Xu/3y8UsG2BgYLicwnk8CHdebUKyZURQ1TgjTH:bYrC8UsGuTwVCHdeQKyZURQ1EjTH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\mls = "\"C:\\Users\\Admin\\AppData\\Roaming\\RAC\\mls.exe\" -s" 062eecfedbfe097c7a42f699a95b7b00N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062eecfedbfe097c7a42f699a95b7b00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2900 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 WINWORD.EXE 2900 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2900 3028 062eecfedbfe097c7a42f699a95b7b00N.exe 30 PID 3028 wrote to memory of 2900 3028 062eecfedbfe097c7a42f699a95b7b00N.exe 30 PID 3028 wrote to memory of 2900 3028 062eecfedbfe097c7a42f699a95b7b00N.exe 30 PID 3028 wrote to memory of 2900 3028 062eecfedbfe097c7a42f699a95b7b00N.exe 30 PID 2900 wrote to memory of 2716 2900 WINWORD.EXE 31 PID 2900 wrote to memory of 2716 2900 WINWORD.EXE 31 PID 2900 wrote to memory of 2716 2900 WINWORD.EXE 31 PID 2900 wrote to memory of 2716 2900 WINWORD.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\062eecfedbfe097c7a42f699a95b7b00N.exe"C:\Users\Admin\AppData\Local\Temp\062eecfedbfe097c7a42f699a95b7b00N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\062eecfedbfe097c7a42f699a95b7b00N.doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5cc1798389875fbc1e9662bf0ce6abbb9
SHA103212348ca82a350234688ad8a190054ccab2684
SHA2560cd2563d439a477a2ecb87ca98d3c4068c0fc0fffa04b2762c27ef9b42769913
SHA5126fdd0fdfea9d58f36dc386a4a804615fba7d336cec8fed7cf07d1a52a972231a94507ba9e3363dff0c053d505d9ef8cd1ce0c7be2210c9e4170ddf387948667a
-
Filesize
1.6MB
MD5062eecfedbfe097c7a42f699a95b7b00
SHA156abd214cbc60748a4ac539bc4f7b00f625b5cf6
SHA256c48c69c6d7ea357ed5372d0f648848787baa3ebf36ca8b8c565833f02af886e0
SHA5121c9951d53b0ba871af91e7f27b9ef00a9b0a8420ec83a5cdcda17ea784e20a75924be323214461e59d10ce9c7a4217ed0f40dda657d7be845e3ffa69f7a2ef13
-
Filesize
19KB
MD58bb472f016d1cca6bd0d4f4647f6e13b
SHA1c558d2c99f09430b6cc5d53bf4a3042d8d87b45c
SHA25676b8291bc8b1eb65644394d95e31d3df15247abf211fd0cc27c01f4dbe9b267b
SHA51216a06871583c3dfa55420937724bbe3d195b45de25f97c4e0f280e8793a6ab8c516f27b14de335eb522d03d57bc7c8b932dea5ad6955f7564fda173ad0d87830