Analysis
-
max time kernel
906s -
max time network
497s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-08-2024 22:45
Behavioral task
behavioral1
Sample
MessageBG_1610.doc
Resource
win11-20240802-en
General
-
Target
MessageBG_1610.doc
-
Size
56KB
-
MD5
5df199efa402d5aaa11fd8756b4e399a
-
SHA1
f0efcbb72247c047bd34635022962b3c48910b0b
-
SHA256
e9f05ac2087835df5d2d82b18d2a6f73a4eedc3a279d16682d725daf474acf40
-
SHA512
be60466f3d9918eeac26cb578d18a3f3a485bc961b8f24a8f83a9cd0d49690b3fdacb8423c7d0586444e4e96fe0f7366c290d2c63a40e3bd0b0267cb47e6d380
-
SSDEEP
768:sMbVsvVEOx48w+5z0IEJp9sqUnreUC8wgbstOIiahAl+xw+t:sMbVsvVEOxyBWb0GQxrt
Malware Config
Signatures
-
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicElegant.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicStylish.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicStylish.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWCapitalized.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Capitalized.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWNumbered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Numbered.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicElegant.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicSimple.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Word2013BW.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Casual.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$ntered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicSimple.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWClassic.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Casual.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Centered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Classic.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$rd2013BW.dotx WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1884 WINWORD.EXE 1884 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1884 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE 1884 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2240 1884 WINWORD.EXE 82 PID 1884 wrote to memory of 2240 1884 WINWORD.EXE 82
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\MessageBG_1610.doc" /o ""1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444B
MD523fd1269744503889b079ebb43443e9a
SHA17f0523fd772a95f6fbe53b6e048bb30e4c8f17cf
SHA256b478bd0dab39bfe96f718df5eaed704f09dd200310c794fbe0b05a6fa3352740
SHA512de7ffdb133ac197f2b976a5cdfffded4f9007e01f4c8b2a202d69510a7c1de6a1201a836869d3ddbdd47d52d73afc707b152c2f31795acb523662fc75abecd88
-
Filesize
444B
MD54aded04f791e52195bd18347486d5d85
SHA1f3ce3181e7e19a93dd78053c589855581b131759
SHA25600a19ad5eb511616b843b18a653d986beb507934b35b3fedede02205a17059c1
SHA512cabbe71cb651d84e0f163d7c471eaa8c07c759edbf7f373f790d9b35451bc2c6b74990913e11be6b3685f70ba90703333b469cf0e7ce275de6e7075c663aeee4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{A0055961-D19C-4899-9685-893FD490AAA3}.tmp
Filesize1024B
MD55d4d94ee7e06bbb0af9584119797b23a
SHA1dbb111419c704f116efa8e72471dd83e86e49677
SHA2564826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
SHA51295f83ae84cafcced5eaf504546725c34d5f9710e5ca2d11761486970f2fbeccb25f9cf50bbfc272bd75e1a66a18b7783f09e1c1454afda519624bc2bb2f28ba4
-
Filesize
76KB
MD53a2f32f7e394122ac815ed3f8077d85e
SHA1174735a0d651c144182eea99c2924e6c5fe6692d
SHA2566d9118d170dead07e281079f870e55b1d6a72d40f2548878508a7838c01845b2
SHA51236f9b2f5df0801cb6a9263452376fc27f33e6ebd780c65bd0da0aa9dcc0178cde2fe5577286fb49b80e80bb911a3550c20921988d6ec80b5f95df8ac7bb23ba9
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
12KB
MD58454bce97bb936c1dee92e3331024bfe
SHA19b3a44daeeb574716eb09e34f449ddaac66a6edb
SHA256b4887aa604c5829838f3f4c6e17fcebec4245e5353d957d458727021ff4d90f7
SHA512b43a54d4ce1f362129387626c02bf3c5038114ca204b100a6a6bb44732b431198b0424a71e5c0a72cc017ca0e7db8a19635203b49593d92400f175db0273fc5f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD586b7d659f3028ecbdf2af97f282e72e9
SHA1ca6756e6341ea040f4dda533c67416403916e15a
SHA25672967f459f5854c0f89a4a58f3e8b01554ec6226d199415a8d0e9ee351d6346a
SHA5129e28153f624987a45b14106cf6d90ceae22f4edd8c7e85bc9188e704bb1f57fa6b02a4a2b4210563330e8e3e31d77519d3ac4198e33fcbe891672dfcbab715d5