Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe
Resource
win10v2004-20240802-en
General
-
Target
5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe
-
Size
610KB
-
MD5
a43c92d0a8c1c953f860a163bba5d079
-
SHA1
2ecb0baf904d7d5eeb98b3b33d68a4528e9644e7
-
SHA256
5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4
-
SHA512
b5d651d7f6fd72765a4e664dbb058f8e68813e3f9109edeb17be22d0bc63a6d619191ef50f7a707d134945ec62b036a871b74a3b45def10cb0738f8eaa67052e
-
SSDEEP
12288:NYIW0p98Oh8P7h8clK0UYF4YPCOxEhCPA1:ZW298E8umURgICy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 B02D.tmp -
Loads dropped DLL 1 IoCs
pid Process 2600 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B02D.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1652 B02D.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1000 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 B02D.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1000 WINWORD.EXE 1000 WINWORD.EXE 1000 WINWORD.EXE 1000 WINWORD.EXE 1000 WINWORD.EXE 1000 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1652 2600 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe 30 PID 2600 wrote to memory of 1652 2600 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe 30 PID 2600 wrote to memory of 1652 2600 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe 30 PID 2600 wrote to memory of 1652 2600 5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe 30 PID 1652 wrote to memory of 1000 1652 B02D.tmp 31 PID 1652 wrote to memory of 1000 1652 B02D.tmp 31 PID 1652 wrote to memory of 1000 1652 B02D.tmp 31 PID 1652 wrote to memory of 1000 1652 B02D.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe"C:\Users\Admin\AppData\Local\Temp\5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\B02D.tmp"C:\Users\Admin\AppData\Local\Temp\B02D.tmp" --pingC:\Users\Admin\AppData\Local\Temp\5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.exe DE87D9FB1370943B3D88EB33C965B5589B67616B05C0424F25AF633252D307DFF0FC5EF757EA5386AFF7DCD7969CAC0E6FA788BD23BFAB16BE2E071ED3DB9DA12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5b28232338d74cd09f895acbdfc312b41541c3732444be1391363439246a8ac4.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
610KB
MD58a13f194f111d605f5b60d548905d7c1
SHA1de2148b9fe2883e85f575bdd0710fcffebd88a9c
SHA25678b91dab824a63dc7c31b3bf1265cede107a2ed72a6f1d84cf5bcee2bac8beec
SHA512143a5fb818cc8c9a5e51abe6a21765394d24736e62acbfb4810a7627094c63a027d1446213495b565470c0d9a9373bef6e2cbcea6a11175c6ccffa399f56c0ae