Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe
Resource
win10v2004-20240802-en
General
-
Target
141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe
-
Size
40KB
-
MD5
81aea8c3fe9df02f22b1b7b24965d850
-
SHA1
4e43b66c1c54e5cc1274ba202b758c504207ca65
-
SHA256
141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068
-
SHA512
36edf22b3353bda36c2baea465bfe48b4558e7f2b6f7193a8db5586753d779d95bc19e511bfe2ec1ea5ea8c8d965e1f48e9fa3e7d5e205e76e3bc3a7b8ecdd91
-
SSDEEP
768:FZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqNWkr7toH:3LsF2Kerc64sTiX2IV0DRGH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1244 WINWORD.exe 2880 WINWORD.exe -
Loads dropped DLL 4 IoCs
pid Process 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 1060 cmd.exe 1060 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2808 PING.EXE 1060 cmd.exe 2904 PING.EXE 1932 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2904 PING.EXE 1932 PING.EXE 2808 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1244 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 31 PID 2544 wrote to memory of 1244 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 31 PID 2544 wrote to memory of 1244 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 31 PID 2544 wrote to memory of 1244 2544 141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe 31 PID 1244 wrote to memory of 1060 1244 WINWORD.exe 32 PID 1244 wrote to memory of 1060 1244 WINWORD.exe 32 PID 1244 wrote to memory of 1060 1244 WINWORD.exe 32 PID 1244 wrote to memory of 1060 1244 WINWORD.exe 32 PID 1060 wrote to memory of 2904 1060 cmd.exe 34 PID 1060 wrote to memory of 2904 1060 cmd.exe 34 PID 1060 wrote to memory of 2904 1060 cmd.exe 34 PID 1060 wrote to memory of 2904 1060 cmd.exe 34 PID 1060 wrote to memory of 1932 1060 cmd.exe 35 PID 1060 wrote to memory of 1932 1060 cmd.exe 35 PID 1060 wrote to memory of 1932 1060 cmd.exe 35 PID 1060 wrote to memory of 1932 1060 cmd.exe 35 PID 1060 wrote to memory of 2808 1060 cmd.exe 36 PID 1060 wrote to memory of 2808 1060 cmd.exe 36 PID 1060 wrote to memory of 2808 1060 cmd.exe 36 PID 1060 wrote to memory of 2808 1060 cmd.exe 36 PID 1060 wrote to memory of 2880 1060 cmd.exe 37 PID 1060 wrote to memory of 2880 1060 cmd.exe 37 PID 1060 wrote to memory of 2880 1060 cmd.exe 37 PID 1060 wrote to memory of 2880 1060 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe"C:\Users\Admin\AppData\Local\Temp\141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00002FF6" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2904
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1932
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2808
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD54b2ab0c20b12a3922d8b7afb0c8eb6b9
SHA1a8e6c37e9068039a4a4f18152d5dcaa701ed06b9
SHA25624c175d07a1fcb66ece2f77467a42677adf8ae1fdd042c1afa0dc6611664f99c
SHA5123b25dec10e12c6a0111f8c65f33be252ce67291bc1548aebb6de1d83848eb57243c4a2156c746d9a0b5cf48e4847cc85aec8f0fdba856938a71c9ce9ef39a8c0
-
Filesize
40KB
MD581aea8c3fe9df02f22b1b7b24965d850
SHA14e43b66c1c54e5cc1274ba202b758c504207ca65
SHA256141460eb52e239ceb6242510477df552b699045b1fea67eb47baaae5165fd068
SHA51236edf22b3353bda36c2baea465bfe48b4558e7f2b6f7193a8db5586753d779d95bc19e511bfe2ec1ea5ea8c8d965e1f48e9fa3e7d5e205e76e3bc3a7b8ecdd91