Overview
overview
4Static
static
1HEADSPIN.exe
windows7-x64
HEADSPIN.exe
windows10-2004-x64
MC.exe
windows7-x64
MC.exe
windows10-2004-x64
BEEP.vbs
windows7-x64
1BEEP.vbs
windows10-2004-x64
1DEL.vbs
windows7-x64
1DEL.vbs
windows10-2004-x64
1DISPLAY.vbs
windows7-x64
1DISPLAY.vbs
windows10-2004-x64
1N1.exe
windows7-x64
N1.exe
windows10-2004-x64
NRLG.bat
windows7-x64
1NRLG.bat
windows10-2004-x64
1NRLG.doc
windows7-x64
4NRLG.doc
windows10-2004-x64
1NRLG1.exe
windows7-x64
NRLG1.exe
windows10-2004-x64
REBOOT.vbs
windows7-x64
1REBOOT.vbs
windows10-2004-x64
1STOP.vbs
windows7-x64
1STOP.vbs
windows10-2004-x64
1TORTUGA.vbs
windows7-x64
1TORTUGA.vbs
windows10-2004-x64
1TRASH.vbs
windows7-x64
1TRASH.vbs
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
HEADSPIN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HEADSPIN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MC.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
MC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BEEP.vbs
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
BEEP.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DEL.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DEL.vbs
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
DISPLAY.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DISPLAY.vbs
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
N1.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
N1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
NRLG.bat
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
NRLG.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
NRLG.doc
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
NRLG.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
NRLG1.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
NRLG1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
REBOOT.vbs
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
REBOOT.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
STOP.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
STOP.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
TORTUGA.vbs
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
TORTUGA.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
TRASH.vbs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
TRASH.vbs
Resource
win10v2004-20240802-en
General
-
Target
NRLG.doc
-
Size
2KB
-
MD5
5eb0b30f6f816614e0ce08daa94e33e3
-
SHA1
3e01474acffd91fd18ac80094db7af506ea3794f
-
SHA256
bfca2a4a9fd3ce343d2c36f96700ee6bba18474005be7f1c67a682f799e1baca
-
SHA512
1be0ba0105cd664738bd3555020f33f170f69fcf507828acf261aa39eb5836d34792c90ef8d6238c8ab857e9602c5f208b6a67bc859d63e0171cf5f36d9a0bdc
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1916 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2688 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2688 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2688 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2688 1916 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NRLG.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD53f143ab7708acdda3ec16b5cc6f068ab
SHA1f24f367a24a33221a417ba73bd84625247b1121b
SHA256a88456b272ecae359ef7677ad9507342b4623d5256d6f7e21905da6356d17df8
SHA512e984e3e599e5ebd084e4d4e91b89f0375cc45a64940c35ffab1b2327fe766a92b124863c077373d58407fb922d98c0ab6ceea3bbf1446417f10a6511cf922175