Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
ad7f288c6c3528a5b8508f7bca6c1050N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad7f288c6c3528a5b8508f7bca6c1050N.exe
Resource
win10v2004-20240802-en
General
-
Target
ad7f288c6c3528a5b8508f7bca6c1050N.exe
-
Size
2.0MB
-
MD5
ad7f288c6c3528a5b8508f7bca6c1050
-
SHA1
7e949316c76cfffd93533b49478244738f2a31fe
-
SHA256
c1764bac71bc705b900e232da0e2c17fdfc94fc3f1d125105785cc3727433886
-
SHA512
439ad4522557c90cefb651358fcb452adf4c21461a9290791bd9fae27bd796fd17f7761d1ac7d90a67221b9d31673341ea70071db7449bc4efce992b67cfe9c3
-
SSDEEP
49152:OFUcx88PWPOpX0SF5+9ycUWgm3M4cIHQHkJYXZOT7yGc:O+K88uPCHT+9y9WcqIOPyGc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 B886.tmp -
Loads dropped DLL 1 IoCs
pid Process 1512 ad7f288c6c3528a5b8508f7bca6c1050N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7f288c6c3528a5b8508f7bca6c1050N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B886.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2952 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2984 B886.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2952 WINWORD.EXE 2952 WINWORD.EXE 2952 WINWORD.EXE 2952 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2984 1512 ad7f288c6c3528a5b8508f7bca6c1050N.exe 30 PID 1512 wrote to memory of 2984 1512 ad7f288c6c3528a5b8508f7bca6c1050N.exe 30 PID 1512 wrote to memory of 2984 1512 ad7f288c6c3528a5b8508f7bca6c1050N.exe 30 PID 1512 wrote to memory of 2984 1512 ad7f288c6c3528a5b8508f7bca6c1050N.exe 30 PID 2984 wrote to memory of 2952 2984 B886.tmp 31 PID 2984 wrote to memory of 2952 2984 B886.tmp 31 PID 2984 wrote to memory of 2952 2984 B886.tmp 31 PID 2984 wrote to memory of 2952 2984 B886.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe"C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\B886.tmp"C:\Users\Admin\AppData\Local\Temp\B886.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe C3D486BA651B5123147CFD304F694966E9D3D964FF31943FB8A84C1C4298D6390F226B8D468D20AA1FFA3BD7AC2E8A1993195DCE15B264DA79249DA0716F31722⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
2.0MB
MD5246c638979317e7a948cd2b50d117d1e
SHA13535dac88403b2f1909b7156f2d19edd6390d87f
SHA256e60157466990a2f98a60e1ce52129529b8ae1cb4e640eae15800e50b831e6461
SHA51225300ca89667e6fc85ba287e921ba54f22e8e6181b5f2a2195458b51b7b1c6080251c488053d7e29d82a33078c37219d44212dbd71ba92ac7835e23b9596f2f7