Analysis
-
max time kernel
57s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 21:58
Behavioral task
behavioral1
Sample
3d095ad534b97e2ff6ff37c5436f25f9e4c207549423344f5e14f307090ea76c.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d095ad534b97e2ff6ff37c5436f25f9e4c207549423344f5e14f307090ea76c.doc
Resource
win10v2004-20240802-en
General
-
Target
3d095ad534b97e2ff6ff37c5436f25f9e4c207549423344f5e14f307090ea76c.doc
-
Size
72KB
-
MD5
7550bc9d2c529d619ed818bcda95ea8a
-
SHA1
5b7397f42f150e8ec578aeae3143719a7abe6787
-
SHA256
3d095ad534b97e2ff6ff37c5436f25f9e4c207549423344f5e14f307090ea76c
-
SHA512
345a4b4c8d62df7dde8405aef168bccc35af6a730f8d92d413bc49e970b487155650f285652a898ad08e4e84b7df032599f7183d9b2cda16bd94c696edf42f23
-
SSDEEP
768:LI+1o9rp7NvJ+SfgYPtYTF5gvLpQoZW6ZjxOb:LI+a9F7NvJ+SVaTF5aFQoZW6hx
Malware Config
Extracted
metasploit
windows/reverse_http
http://192.168.45.210:443/vTJnmWa7eOVXAVYAMeLi6gsjWtaHFoJfzCFbNHM7VIHezv6GJQq9rXDeuC4WjDI0Bey4I-zqqaJE5yVnl-HLo9s4Nljrt-fyGYztngmXyvkyfHrY6AtxcQzaHJgJRqAz5B0bEFG3-LxEBOyhO6a9WFauq8j52vB4gLewjPRp58z1YHMvd9-mghGjGjFmkqfztnWknx
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1988 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 WINWORD.EXE 1988 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2780 1988 WINWORD.EXE 30 PID 1988 wrote to memory of 2780 1988 WINWORD.EXE 30 PID 1988 wrote to memory of 2780 1988 WINWORD.EXE 30 PID 1988 wrote to memory of 2780 1988 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3d095ad534b97e2ff6ff37c5436f25f9e4c207549423344f5e14f307090ea76c.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2780
-