Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 01:20
Behavioral task
behavioral1
Sample
74c023ecd78c398e4578b59986cdadd8b72d898e22142516de85d57150d9fada.docx
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
74c023ecd78c398e4578b59986cdadd8b72d898e22142516de85d57150d9fada.docx
Resource
win10v2004-20240802-en
General
-
Target
74c023ecd78c398e4578b59986cdadd8b72d898e22142516de85d57150d9fada.docx
-
Size
291KB
-
MD5
7809e177584176e9def925007146cc5c
-
SHA1
c9827ff0398a018ff21ebd23e3e0297d95fe1696
-
SHA256
74c023ecd78c398e4578b59986cdadd8b72d898e22142516de85d57150d9fada
-
SHA512
8396eb7264bc8bbf76f594de2f2ca496ffcb86a830e6033a93a94e27096de7cebe2718fa7bfccd5092ed51f9f1ff0fae0785eaf14d8ce425650bed9a207e6d2e
-
SSDEEP
3072:v3DkKNI/SPjo6554RvFqBrtwB6e4tXbVfWOen/3cRKEBfCB4CX1vM6KGJSi9KWDV:ljLevFCXbVfWk1AvQaqbodcESCZ8ns
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2136 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2824 2136 WINWORD.EXE 32 PID 2136 wrote to memory of 2824 2136 WINWORD.EXE 32 PID 2136 wrote to memory of 2824 2136 WINWORD.EXE 32 PID 2136 wrote to memory of 2824 2136 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\74c023ecd78c398e4578b59986cdadd8b72d898e22142516de85d57150d9fada.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD503ae144e343e95fdc0ad79038ff5f437
SHA14b367907f34cefb590a906d9f08c192657dbc7a7
SHA2562df5ceff842695a884a586235b6df753d65d9693433292483d5fe4ad910371fa
SHA512e52b2305a69dc7cc920250fcbf54dcdcc33e75bda81957bc49d0e405dd558e92d89784d82568ba930f879764b9fe4fa4474cea52362cae495429542c29d63147