Analysis
-
max time kernel
55s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 21:08
Behavioral task
behavioral1
Sample
4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc
Resource
win10v2004-20240802-en
General
-
Target
4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc
-
Size
36KB
-
MD5
10e8b4603e3d74e1313a8b1bfe769aba
-
SHA1
7c3be0d85bcaaa2971cd11d27daa3a768dbac607
-
SHA256
4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3
-
SHA512
250f7ff7d06ab1bd1e0783be6161c5abad63038846d09cb1e93acc1039c55a32296ecd22392e3cb22a1821bf032325da0661c6f1d603346e4b853579384dc7a6
-
SSDEEP
384:V2iSwvxjk+t06DANg0jnYp+pwImOHZeAtg:VZxw+tWyeYp+pwiHZ
Malware Config
Extracted
metasploit
windows/reverse_http
http://10.0.2.10:443/p4DfyETEFRQZvRi8f116CwyCwZ3NbYRQwuNfuZ3EWMO42NyZCQHvcfroriyiuo5PukNI-RN067bhqoc294am5cEIgLw7uf114beUn2K9F1hCPsWKfTiP-nK9pqz-Jwntm8YeIge8gVM4YLkTLkWs2uIA3FX6kUJknwWLQfffuKyg8wVy3jHUrhtee7R4fh0_MnqL
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 904 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 WINWORD.EXE 904 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 3064 904 WINWORD.EXE 29 PID 904 wrote to memory of 3064 904 WINWORD.EXE 29 PID 904 wrote to memory of 3064 904 WINWORD.EXE 29 PID 904 wrote to memory of 3064 904 WINWORD.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4052808933352ca1d48c49de6c7635d3736de9a8665cb40b74f7c5fdf72c01a3.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3064
-