Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 02:41

General

  • Target

    6c055a021e4446a6d4f3c25690988c10N.docm

  • Size

    513KB

  • MD5

    6c055a021e4446a6d4f3c25690988c10

  • SHA1

    81661d0510c4b8a4a5c9bf7955c8cd4ed891c1b1

  • SHA256

    956bd5ac5746f4e92c9ae97c77e714188ebfb49e7552113dafe871e62853860e

  • SHA512

    06ce4de973c7baeb53f27a9b2965f24bf8d49a216c8449d8d66d62c2d54d386e74d974adeab773d36d817bf6fe56ea5e67d66cbbdaf1b157c6522f399efc1c6e

  • SSDEEP

    12288:bHAE+gcDDzlWnnqIDmaFMUA7VwnNwcDETWEfD6l/JuJwBpf9:bHAZ7z6nqOwUA7Vwn3DETWCwuqX

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://139.162.249.106:4444/9dPuUFpOeQ_mZudnh_Bk-gB3qENo3TtVIO1XahDnEp9dYlN98R8WEzbaRv-XnQuPRJxx4Y-98k3fwiEKUgHRAftoYFiwaXDFU4fty1ZfyvSILA0P-NZauCtJHFpPtBiVkyTrXvBZX5t6yGOXuefG1UC14v8uMSaWyvOqd

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6c055a021e4446a6d4f3c25690988c10N.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2016
      • C:\Users\Admin\AppData\Local\Temp\rad1820B.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\rad1820B.tmp.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      4adda0bb94befb11c1fa751f20b125b7

      SHA1

      13a8c3a536f448f33017dc4209066166b3878a68

      SHA256

      4e9e4d088692d3e934cab4bb1f8c567c491afd955c2cc25e8848c2b55559387c

      SHA512

      69632ebc70d547c75c64e9f007b4e4f5786d4cb9f73e7ad79bbaf7ac5ec2427356d6a9731667b3f9b4365b1124e6319369957de39e8f1875a712016b59fe8f66

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \Users\Admin\AppData\Local\Temp\rad1820B.tmp.exe

      Filesize

      72KB

      MD5

      6ba5f5202585682d55bbed282f3f367b

      SHA1

      d8406910a24f29fe9ead50a53ae9367952efccf4

      SHA256

      7ea6d252b83e03e7daa08d7d419a18f47b617504d4b50cd9a06cc531789a0e7b

      SHA512

      d739b56c3d53c58eb63ac1a600eda41571a0dd4522a598ea7a10f4e1966cb720d61a221de4d5857b1cfc1db71e524b48a8190cd80237ca0060094f64be326ac2

    • memory/768-13-0x0000000005260000-0x0000000005360000-memory.dmp

      Filesize

      1024KB

    • memory/768-18-0x0000000005260000-0x0000000005360000-memory.dmp

      Filesize

      1024KB

    • memory/768-24-0x0000000005260000-0x0000000005360000-memory.dmp

      Filesize

      1024KB

    • memory/768-0-0x000000002F941000-0x000000002F942000-memory.dmp

      Filesize

      4KB

    • memory/768-2-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/768-48-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/768-49-0x0000000005260000-0x0000000005360000-memory.dmp

      Filesize

      1024KB

    • memory/768-50-0x0000000005260000-0x0000000005360000-memory.dmp

      Filesize

      1024KB

    • memory/768-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/768-72-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2720-34-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB