Overview
overview
8Static
static
36fdccfbcf3...bd.exe
windows7-x64
76fdccfbcf3...bd.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDIR/EULA.rtf
windows7-x64
4$PLUGINSDIR/EULA.rtf
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3$TEMP/scen...er.exe
windows7-x64
8$TEMP/scen...er.exe
windows10-2004-x64
8Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
6fdccfbcf36463c0d9212d148dd946d0669e334099fe35b0db00317ab837b7bd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fdccfbcf36463c0d9212d148dd946d0669e334099fe35b0db00317ab837b7bd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/EULA.rtf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/EULA.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$TEMP/scenic-magicalchristmas-wallpaper.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$TEMP/scenic-magicalchristmas-wallpaper.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/EULA.rtf
-
Size
17KB
-
MD5
0369fd4801819cf7ecec362224c518a7
-
SHA1
98520ff7afce25000f4c293f7b4b925a368b101d
-
SHA256
bbfb052969657e005eb1db1e998f2cbd45fd7f44b214fe262a6c5c94443be20f
-
SHA512
1b4fe3af2ced6614d97358c1f571240c451f91712281dfa01d286a4ad66081aeec0a45ad5b0bf04f83e499977a38ca9d93943b1bd92ceae5a2c02f5f628201a3
-
SSDEEP
192:zEf8chvUt1wrN2NcerasvDh/ndI0jyGjQLTKQN686NCHyjvtsoeVQTcOHmNoBlRH:zkRUorMfaGFg4WTd6BjvWQlRFyvmsV2
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1976 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 WINWORD.EXE 1976 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2996 1976 WINWORD.EXE 31 PID 1976 wrote to memory of 2996 1976 WINWORD.EXE 31 PID 1976 wrote to memory of 2996 1976 WINWORD.EXE 31 PID 1976 wrote to memory of 2996 1976 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\EULA.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD550776dbbc0e12223e78dee0983a193a1
SHA1d9a00980bf5592d0e78c11c8258e62341d6df1bd
SHA256ed5b82ba35d1455eac5c3baf471f582da2ce10b85a74cc70f46757c914e2bd5f
SHA5129bc66b169b7164d45fc68ad9979b6dd1f5e917a57ede2a4cc9bacdcdeff099ba2182461e8195ad727c7fd5ab7cf5de461d017b551f40c94e92ea3d876b5fc6ad