Overview
overview
4Static
static
1__MACOSX/....dle403
windows7-x64
3__MACOSX/....dle403
windows10-2004-x64
3__MACOSX/c..._store
windows7-x64
3__MACOSX/c..._store
windows10-2004-x64
3__MACOSX/c...es.rtf
windows7-x64
3__MACOSX/c...es.rtf
windows10-2004-x64
1__MACOSX/c...03.dmg
macos-10.15-amd64
cr-paddle4..._store
windows7-x64
3cr-paddle4..._store
windows10-2004-x64
3cr-paddle4...es.rtf
windows7-x64
4cr-paddle4...es.rtf
windows10-2004-x64
1cr-paddle4...03.dmg
macos-10.15-amd64
1Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
__MACOSX/._cr-paddle403
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
__MACOSX/._cr-paddle403
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
__MACOSX/cr-paddle403/._.ds_store
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
__MACOSX/cr-paddle403/._.ds_store
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
__MACOSX/cr-paddle403/._Install Notes.rtf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
__MACOSX/cr-paddle403/._Install Notes.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
__MACOSX/cr-paddle403/._cr-paddle403.dmg
Resource
macos-20240711.1-en
Behavioral task
behavioral8
Sample
cr-paddle403/.ds_store
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
cr-paddle403/.ds_store
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
cr-paddle403/Install Notes.rtf
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
cr-paddle403/Install Notes.rtf
Resource
win10v2004-20240910-en
Behavioral task
behavioral12
Sample
cr-paddle403/cr-paddle403.dmg
Resource
macos-20240711.1-en
General
-
Target
cr-paddle403/Install Notes.rtf
-
Size
2KB
-
MD5
f70cc135aecb5e680a8b1aa26b01c072
-
SHA1
29ff94a989db3c9be48e43a216afab382e2509e1
-
SHA256
fc717a4bc289a509c730d9debaa69de1153708b6dfa062e7a6961d59ba96e6f0
-
SHA512
4524181abe4dcec5cc0c89645e7fc350c7865f7ca759acdc8b38898fbc531ececfeef4be7114cec983bcf2c5605c14a4daf112c1c9060208b7559183ffc130c8
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1868 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1868 WINWORD.EXE 1868 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2732 1868 WINWORD.EXE 31 PID 1868 wrote to memory of 2732 1868 WINWORD.EXE 31 PID 1868 wrote to memory of 2732 1868 WINWORD.EXE 31 PID 1868 wrote to memory of 2732 1868 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cr-paddle403\Install Notes.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD51a4265605ba1ba3e9b1547a976afd2f3
SHA1f4f62027c68018d6ccb1a7226c42d9cc45e6dc4b
SHA256296af5d6ca74ece3157f6feddf96c56d057a6cbab23dd97c8e1c106e7ea72e44
SHA512d254c6cb05236776143eff9e3eb9b947cb380df389418a6e3539d7c5155aa77ef26848a2a187aa8388064dde0c158eb7edc26a2ebe9e8cc49f043f7ed60f6899