Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
82da066114537330ed9ec88079dfe890N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82da066114537330ed9ec88079dfe890N.exe
Resource
win10v2004-20240802-en
General
-
Target
82da066114537330ed9ec88079dfe890N.exe
-
Size
874KB
-
MD5
82da066114537330ed9ec88079dfe890
-
SHA1
472794825c6a584f637086ac254f8af30d264f63
-
SHA256
4b7110ba9edcf3051cdc8ccea3181a38a59113c2e0a64f0767c3d31e7841861e
-
SHA512
b23ebc659dee31f07d48b00283ea5e465119caf7cc8e8840932aa83efe5a012eefce01bcd78b61f2cff9207a0faf9c6aeb5cc170399a137de0a2222c763006e0
-
SSDEEP
12288:eYIW0p98Oh8P7h82e9Kcp0JopWOV6zt9f/YfYIWuOh8P7h8:uW298E8u2NY0ipWOi9fkWuE8u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 8575.tmp -
Loads dropped DLL 1 IoCs
pid Process 2512 82da066114537330ed9ec88079dfe890N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82da066114537330ed9ec88079dfe890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8575.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2372 8575.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3008 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 8575.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE 3008 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2372 2512 82da066114537330ed9ec88079dfe890N.exe 30 PID 2512 wrote to memory of 2372 2512 82da066114537330ed9ec88079dfe890N.exe 30 PID 2512 wrote to memory of 2372 2512 82da066114537330ed9ec88079dfe890N.exe 30 PID 2512 wrote to memory of 2372 2512 82da066114537330ed9ec88079dfe890N.exe 30 PID 2372 wrote to memory of 3008 2372 8575.tmp 31 PID 2372 wrote to memory of 3008 2372 8575.tmp 31 PID 2372 wrote to memory of 3008 2372 8575.tmp 31 PID 2372 wrote to memory of 3008 2372 8575.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe"C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\8575.tmp"C:\Users\Admin\AppData\Local\Temp\8575.tmp" --pingC:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe 93A190B094AC70960735BAFC33094AD3CB71DDD755FC3D862A9B20A65757FBC49F2944D807076FCC32F6662227359CF450A0EAB105A72E3030EE252DEF70C4F42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
874KB
MD56f8e86b6219452b00856fb4de7838464
SHA1a4ba40b8f1b4402776aa1b45a1cd0c90409c5c95
SHA256738c1eccd3885ab0e701194e0e690ee35e229ffef26ef03213d69225346f355b
SHA512a71c1bbab73dd95b31f9d1bed8945928cec26d9183e7e48b689b9102e987a536d525a775ac3bd65f5cefce402c461156952e641bcb3636f621bc0356681e6c12