Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
56aa85fc977f111ef013ea628bd8e4b4f8e651bad075bb134a47ab9440833a99.dotm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56aa85fc977f111ef013ea628bd8e4b4f8e651bad075bb134a47ab9440833a99.dotm
Resource
win10v2004-20240802-en
General
-
Target
56aa85fc977f111ef013ea628bd8e4b4f8e651bad075bb134a47ab9440833a99.dotm
-
Size
2.5MB
-
MD5
72f378d23745d8fbd7e4c4ce1c33d3b5
-
SHA1
c09830831d6ab6b7c8d39ad5c1e91f4e192cbe9a
-
SHA256
56aa85fc977f111ef013ea628bd8e4b4f8e651bad075bb134a47ab9440833a99
-
SHA512
9439c7518fe3f5471bf787ed27f118fe3b6455e9d10fcff07ce91f2f22bde4345c16d0f56b3f98aa74b33b80fe158fb661c7280afa729a53114a723cd0b21132
-
SSDEEP
49152:8xl1S/AiLVBl74KPjSpAGQpUG40uqSIQGjahamQ0EH7mJJQCO:cjEFUfi/VhW4mQbSOR
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3044 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3044 WINWORD.EXE 3044 WINWORD.EXE 3044 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4960 3044 WINWORD.EXE 32 PID 3044 wrote to memory of 4960 3044 WINWORD.EXE 32 PID 3044 wrote to memory of 4960 3044 WINWORD.EXE 32 PID 3044 wrote to memory of 4960 3044 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\56aa85fc977f111ef013ea628bd8e4b4f8e651bad075bb134a47ab9440833a99.dotm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4960
-