Analysis
-
max time kernel
55s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 21:01
Behavioral task
behavioral1
Sample
548512f33c844c1e0751be1b5ac138d38a58f22f984ccf636152c3228fc9b645.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
548512f33c844c1e0751be1b5ac138d38a58f22f984ccf636152c3228fc9b645.doc
Resource
win10v2004-20240802-en
General
-
Target
548512f33c844c1e0751be1b5ac138d38a58f22f984ccf636152c3228fc9b645.doc
-
Size
38KB
-
MD5
1cf374f308f3f58429806470cb513b7a
-
SHA1
f7396c22175e4df3b666713aa40c65ecabd48981
-
SHA256
548512f33c844c1e0751be1b5ac138d38a58f22f984ccf636152c3228fc9b645
-
SHA512
0293aba4f71bb769f2c15ea7b2c9c6000f60a95d03d6218eb844c998a02694ffdeead1b494a50de23e9099d9fcb9148b2cda429728334162dd969d3fa3e0fd4f
-
SSDEEP
384:sSiSwvxjk+t2YrhR/egp/SOKZ5o42jKHXyknWzOg0j+ctB:sVxw+tDNR/DKZ5o4H3yknqnb
Malware Config
Extracted
metasploit
windows/reverse_http
http://10.0.2.10:443/QCZ9i3I5cAEcjh2PemTorgY4WZ6cGX7vGe4jY-Uqvj9Qk8C6G-1MqrTnFijh292xH44jg6bKV41Dfr5RtGwUJ9eyRhfI8CbD_QX0DvO9yL4OoI1xNpshDqUkY8_yvrN7X6Z4o2X3x05Z9zZDnFP0sRxY9vEd5qM_lys_SNq9qDhpFSKcHdFgfEvuASdc35OQLtNktxmCUhSKJJ1xb8r61tf
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1924 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1924 WINWORD.EXE 1924 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1404 1924 WINWORD.EXE 30 PID 1924 wrote to memory of 1404 1924 WINWORD.EXE 30 PID 1924 wrote to memory of 1404 1924 WINWORD.EXE 30 PID 1924 wrote to memory of 1404 1924 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\548512f33c844c1e0751be1b5ac138d38a58f22f984ccf636152c3228fc9b645.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1404
-