Analysis
-
max time kernel
53s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:25
Behavioral task
behavioral1
Sample
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc
Resource
win10v2004-20240730-en
General
-
Target
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc
-
Size
51KB
-
MD5
1fed6b0c5e2f96c1787cf90804d50a3c
-
SHA1
f93237d106a36133c71df0de181bf73d7407484d
-
SHA256
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39
-
SHA512
5b12084f9d690e9b589cb07c4aedf3680392a29e744ae367ccac4ffd4490f1df4f5446f5fb93cf71827c7ca2061c047593a116838cea8d540d68e1bf2e83b863
-
SSDEEP
768:mwIIIIIJbIsR+k5++M5y7iIP4KDDaxhXM:0kk8Hy7iIP4cDchX
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 560 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 560 WINWORD.EXE 560 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 960 560 WINWORD.EXE 29 PID 560 wrote to memory of 960 560 WINWORD.EXE 29 PID 560 wrote to memory of 960 560 WINWORD.EXE 29 PID 560 wrote to memory of 960 560 WINWORD.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:960
-