Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 18:27
Behavioral task
behavioral1
Sample
efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm
Resource
win10v2004-20240802-en
General
-
Target
efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm
-
Size
53KB
-
MD5
35fee95e38e47d80b470ee1069dd5c9c
-
SHA1
499741c55cae1c4e76a90a9572fda191ca2d0451
-
SHA256
efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118
-
SHA512
c017a5b7e38f7bc79a148ad7984839a5a7faeb2cda62fd4f337af4ff1693e4a25a68c4d22bba0bcdc527b77a3faf250b20b053841b26dca5da5e9a8913cfdec7
-
SSDEEP
768:pJYfzvmaYEawlszCfXDhQUsjiSqIbo9M79RiOglY0D6I6luuHUueAt4AOVSKq+EY:c7m+S+uiSzQMkY0D6I2ipAt4OdK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 WINWORD.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2216 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2216 WINWORD.EXE 2216 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE 2780 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2304 2216 WINWORD.EXE 33 PID 2216 wrote to memory of 2304 2216 WINWORD.EXE 33 PID 2216 wrote to memory of 2304 2216 WINWORD.EXE 33 PID 2216 wrote to memory of 2304 2216 WINWORD.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm"1⤵
- Deletes itself
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm
Filesize50KB
MD5d382e2b208ec6e4a70a08ec0e6fe2b4d
SHA110897df6d3d2056c02556ec239e84e48ee3e144e
SHA256c6d1590df34fd9bf9c2d98b5f2af9b63cbffca939dadb407b2389d709c1f723a
SHA51260b6186b51226962b4c9eeb61c62c6ef7b7a287519f7146c5a83d839083027b95e14c745fd5ad8bcc54b926925d2740fd6249764a9364d22874321f92f7ae878
-
C:\Users\Admin\AppData\Local\Temp\efc99e6f3cdd10313c52a8ad099424e3f39ab85b75375b8db82717d61c7f0118.docm.doc
Filesize22KB
MD563bd43c490a9f55ffff04dfc51349b0f
SHA13e0e178869a3ef30710000a1224a88e413bcfd26
SHA2563d9eeb8f9f5307d89460fc6d941737334b50a765ba28c01ae7475eb72a560343
SHA5120a9c1af7d04fb27c2491b6f24baa4c8c843e2167747756f85568ed83ac5350ebf8ccb5052c80147bb98bbd6f1e011dc73969667e8ad96a905413f65ded78587c
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84