Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 21:11
Behavioral task
behavioral1
Sample
c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd.doc
Resource
win10v2004-20240802-en
General
-
Target
c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd.doc
-
Size
35KB
-
MD5
59a5c322894532880f84b8019dcdd0cf
-
SHA1
7fd471e6db362b84c47d9ce2501703e954dc5ff2
-
SHA256
c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd
-
SHA512
22eaca6b9486f8309b25fa8875f35d64a391e2eb3780c53d37097392a8720b78267571319e39720ffa39f27b39e129433b3f0703158dba35df7f8f5c1e7a998b
-
SSDEEP
384:gyiSwvxjk+t0/8iRMsPJ1XM4CQn6DQl0jYktv5y6CEt:g1xw+tEDRMsR1X/5mQlrkny6C
Malware Config
Extracted
metasploit
metasploit_stager
10.127.246.155:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2252 2068 DW20.EXE 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DW20.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwwin.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2068 WINWORD.EXE 2068 WINWORD.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1712 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 1712 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 1712 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 1712 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2068 wrote to memory of 2252 2068 WINWORD.EXE 33 PID 2252 wrote to memory of 2720 2252 DW20.EXE 34 PID 2252 wrote to memory of 2720 2252 DW20.EXE 34 PID 2252 wrote to memory of 2720 2252 DW20.EXE 34 PID 2252 wrote to memory of 2720 2252 DW20.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c49e231dbc89b50f9f4c40148d61bb6000d03455f38112f6bf02900fa2b47dbd.doc"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1712
-
-
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 12602⤵
- Process spawned suspicious child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 12603⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59466c4162ab72479cfa68e9713dc7f81
SHA102bde5f1bf195556ac2686279854f15284698658
SHA256d75b134afaf29dc12a2941b6e31ddc902754c1b44e1ddfc7d16ad9be7f7c5998
SHA51263323a20b1c7d1e786c7bd1f67587a5c89e5320098e0835df93abbe2de84fa7bb21c40ca7a93fb13d5f2818b8fc8c22ebe18948120756e7914055100aae388cb