Overview
overview
7Static
static
7C60DOSX.dll
windows7-x64
3C60DOSX.dll
windows10-2004-x64
3C60OLEX.dll
windows7-x64
3C60OLEX.dll
windows10-2004-x64
3C60RUNX.dll
windows7-x64
3C60RUNX.dll
windows10-2004-x64
3C60TPSX.dll
windows7-x64
3C60TPSX.dll
windows10-2004-x64
3gb_ems.ps1
windows7-x64
3gb_ems.ps1
windows10-2004-x64
3gb_ems.exe
windows7-x64
7gb_ems.exe
windows10-2004-x64
7iQxml.dll
windows7-x64
3iQxml.dll
windows10-2004-x64
3license.rtf
windows7-x64
4license.rtf
windows10-2004-x64
1sender.ps1
windows7-x64
3sender.ps1
windows10-2004-x64
3sender.exe
windows7-x64
7sender.exe
windows10-2004-x64
7tracker.exe
windows7-x64
7tracker.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:06
Behavioral task
behavioral1
Sample
C60DOSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
C60DOSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
C60OLEX.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
C60OLEX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
C60RUNX.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
C60RUNX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
C60TPSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
C60TPSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
gb_ems.ps1
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
gb_ems.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
gb_ems.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
gb_ems.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
iQxml.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
iQxml.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
license.rtf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
license.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
sender.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
sender.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
sender.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tracker.exe
Resource
win7-20240903-en
General
-
Target
license.rtf
-
Size
39KB
-
MD5
37e589de46ff186440ee383abc1dc563
-
SHA1
4d5dedf42474567ee43d2c46548f4993b2422ee2
-
SHA256
cff641e1620777017989052c1844e697f4406e28b70767843ca2c8cd53420306
-
SHA512
659664dbf70967f457c29d33711b136164f5725b45190ce6c28b89605a501e9e52d0f705545632a910489ab30e1ae687ff9d27219b1e61fa9dc2249b63c1eea4
-
SSDEEP
384:zpJkpvJvcDp/7hdt1CPFr+4Tt8LGQfHnkTVMHeo75Y3kmA31dv61Qyq:zpJmqt1CBjjZrS14u
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2060 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 WINWORD.EXE 2060 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2832 2060 WINWORD.EXE 31 PID 2060 wrote to memory of 2832 2060 WINWORD.EXE 31 PID 2060 wrote to memory of 2832 2060 WINWORD.EXE 31 PID 2060 wrote to memory of 2832 2060 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\license.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD561bb134ae2160e89dc9987b03e522ba3
SHA149078057df518e4bb6ed58ec93c031102790965a
SHA256a55e4b1cef44609510f7094a791f6faf3413fb75b7dbf2c0729b1fb61a4058cb
SHA512ee421f50543930dc0758408aba54487d54651cc350467ac687496bd9599d3b6ae09edd0ffc1cb57f57c54373f03f51b7d8585c6b2152a2b88c0b4bd51e42e7fc