Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
432a3b47fa1590e88a9d86debc8351e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
432a3b47fa1590e88a9d86debc8351e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
432a3b47fa1590e88a9d86debc8351e0N.exe
-
Size
654KB
-
MD5
432a3b47fa1590e88a9d86debc8351e0
-
SHA1
6e9503b44e833dcebbd0257521db836727dca662
-
SHA256
808f7d314181f4d8d1d9c4d7581b4498f597f0767748e7167ca9fcd5aa0a89d9
-
SHA512
cd1e75bc7a20bc25d37a25edff5556a8a374fa7be1a414f6abd71bec2e8b32794fb5a3b050a47a2aaf52e75cb3fc325bdb02dc3a25d19a967f324a46dee2c809
-
SSDEEP
12288:oYIW0p98Oh8P7h83ZASuM5glC4iyNTyRRa2HzUyFc32TPu7he9gyCWTHb:EW298E8u36SRel8yFUaiUyFc32TPu7hU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 476C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2652 432a3b47fa1590e88a9d86debc8351e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 432a3b47fa1590e88a9d86debc8351e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 476C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2684 476C.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2688 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2684 476C.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2688 WINWORD.EXE 2688 WINWORD.EXE 2688 WINWORD.EXE 2688 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2684 2652 432a3b47fa1590e88a9d86debc8351e0N.exe 30 PID 2652 wrote to memory of 2684 2652 432a3b47fa1590e88a9d86debc8351e0N.exe 30 PID 2652 wrote to memory of 2684 2652 432a3b47fa1590e88a9d86debc8351e0N.exe 30 PID 2652 wrote to memory of 2684 2652 432a3b47fa1590e88a9d86debc8351e0N.exe 30 PID 2684 wrote to memory of 2688 2684 476C.tmp 31 PID 2684 wrote to memory of 2688 2684 476C.tmp 31 PID 2684 wrote to memory of 2688 2684 476C.tmp 31 PID 2684 wrote to memory of 2688 2684 476C.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\432a3b47fa1590e88a9d86debc8351e0N.exe"C:\Users\Admin\AppData\Local\Temp\432a3b47fa1590e88a9d86debc8351e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\476C.tmp"C:\Users\Admin\AppData\Local\Temp\476C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\432a3b47fa1590e88a9d86debc8351e0N.exe 817CB723496DEA1231BB66B68596EB87E6E5EA5093BC67A2E825549587D19A46F28C6E716B32B63BCB20A1358163C874DAC20CF47D52F47ED0641A00DB420A782⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\432a3b47fa1590e88a9d86debc8351e0N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
654KB
MD5f30b840c3f34fd841460db69d0544da0
SHA17aeaaabd5008fa70e03de1ea1a520d5a6d035062
SHA25629a5f33e95e399784017d91b43e0e5954ddeb227d27d931213d65e27202c9a82
SHA5127a844ca88da972b5d842ea609b84f2027492cd9efe9d4fbafa1ba2dc64e2633a74aeeea6a679ed207bd69cb0621e20b44ea30b77499bb9952e9e100646c0064b