Analysis
-
max time kernel
113s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f7ae13ccffb8acdabc785171e5d27d9e27b52f047d9489a0b489a40fcf7cc950.docx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7ae13ccffb8acdabc785171e5d27d9e27b52f047d9489a0b489a40fcf7cc950.docx
Resource
win10v2004-20240802-en
General
-
Target
f7ae13ccffb8acdabc785171e5d27d9e27b52f047d9489a0b489a40fcf7cc950.docx
-
Size
179KB
-
MD5
dc69a61ced4f40309162ffd3270dd3cc
-
SHA1
0b1f95b1b17e5298856c016d94b529b7f01a910d
-
SHA256
f7ae13ccffb8acdabc785171e5d27d9e27b52f047d9489a0b489a40fcf7cc950
-
SHA512
0f31be7d4383e7465ddafa5d79e57ffc018b1a11b46cc2b1bf862cc392a9aff401f9f70eea980d263ab553d5f6f2bd4b030ed59e9eace992e1e2e63abc9ec56f
-
SSDEEP
3072:QiY5rj1ATug+mhTZMxjcFQ9csn4qAzYjDp/shKuikycBSRjR/Vx7XU8hNu:K5r/g+qZMpcFSQzYHut4dhvu
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2024 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2204 2024 WINWORD.EXE 32 PID 2024 wrote to memory of 2204 2024 WINWORD.EXE 32 PID 2024 wrote to memory of 2204 2024 WINWORD.EXE 32 PID 2024 wrote to memory of 2204 2024 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f7ae13ccffb8acdabc785171e5d27d9e27b52f047d9489a0b489a40fcf7cc950.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD53338bbcc314cd3de2a76d79caeebc43d
SHA1ebcaf3f9f166a4ecb14e9523de36e3ec891f18ca
SHA256adda656d845fe79d3db77fc6663750ca1d71b167267db1eafcf0822e9da97e0c
SHA5126ce0e3dc061251deb5bbdccfd052e35159b9d95b19cebd08687a37b771b5e811cac083743d060586458a7509f42bac2a0c262e4446bb1747917701cc9fe7cccd