Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
c3fc965f18e1d276e99b8e62c9ac50180c6dcba4b3f3e69226d7191294eaa308.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c3fc965f18e1d276e99b8e62c9ac50180c6dcba4b3f3e69226d7191294eaa308.doc
Resource
win10v2004-20240802-en
General
-
Target
c3fc965f18e1d276e99b8e62c9ac50180c6dcba4b3f3e69226d7191294eaa308.doc
-
Size
56KB
-
MD5
858f6e202c6aaf8df6921fe587fb3bda
-
SHA1
7709baba439e7abe1459801d623260a590a74d3b
-
SHA256
c3fc965f18e1d276e99b8e62c9ac50180c6dcba4b3f3e69226d7191294eaa308
-
SHA512
8ec84d39792eb8104f527510f36a4ac1f987de5097775a39f48c78afc56e305ec305686a9686c334ff6d1e71a696f2b72c776b3537c5d7f99a96f8e8780b4b24
-
SSDEEP
768:znny6KLYHJfnwOeeeee9EafxH0gswvgOxn:znny6KLYHFwNEKxH0gsmf
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2504 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2504 WINWORD.EXE 2504 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2012 2504 WINWORD.EXE 32 PID 2504 wrote to memory of 2012 2504 WINWORD.EXE 32 PID 2504 wrote to memory of 2012 2504 WINWORD.EXE 32 PID 2504 wrote to memory of 2012 2504 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c3fc965f18e1d276e99b8e62c9ac50180c6dcba4b3f3e69226d7191294eaa308.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2012
-