Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:26
Behavioral task
behavioral1
Sample
28af5418477978fa3586968c2e11553827dc5934819c06fddbea166c5233c66c.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28af5418477978fa3586968c2e11553827dc5934819c06fddbea166c5233c66c.doc
Resource
win10v2004-20240802-en
General
-
Target
28af5418477978fa3586968c2e11553827dc5934819c06fddbea166c5233c66c.doc
-
Size
40KB
-
MD5
a37f95e1db67ee570e21c03ba5e2fd7f
-
SHA1
642b71202d9a938c873c99bc7e14620da680484e
-
SHA256
28af5418477978fa3586968c2e11553827dc5934819c06fddbea166c5233c66c
-
SHA512
c004cd69f39d6a37b0e507cc5513348eb7ccf1cd1032c1ca080f165cd2939f0de2c3a776b6e52fbf91c67b5388584da22f9699c2fbe02f5e5b29fa0db9966d23
-
SSDEEP
384:NTeiSwvxjk+t7yB3uqV2b8lc+rFFpw00jyodte/5:ZRxw+tYV2oFZvVo
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2340 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2340 WINWORD.EXE 2340 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2152 2340 WINWORD.EXE 30 PID 2340 wrote to memory of 2152 2340 WINWORD.EXE 30 PID 2340 wrote to memory of 2152 2340 WINWORD.EXE 30 PID 2340 wrote to memory of 2152 2340 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\28af5418477978fa3586968c2e11553827dc5934819c06fddbea166c5233c66c.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2152
-