Analysis
-
max time kernel
70s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe
Resource
win10v2004-20240802-en
General
-
Target
691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe
-
Size
576KB
-
MD5
7c4d97483f0989866f0959ae64ef9da0
-
SHA1
537bcf9c832eed2f73325cc6075a96a62b01253b
-
SHA256
691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492
-
SHA512
73f626fdad026e55b4064feaed634db6ffc0ba275a753a53138f74a9a5cef5773e9481a8d3056a465d795fe0570c16bd8d6b1245542cb0c5de94f8df7c2ac663
-
SSDEEP
12288:yYIW0p98Oh8P7h8L3rPmZcXd4eVFrzk9B/4uMe2r:qW298E8uz7t4eVFrzk9B/4uMe2r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 EABC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2248 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EABC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2700 EABC.tmp -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2788 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2700 EABC.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 WINWORD.EXE 2788 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2700 2248 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe 31 PID 2248 wrote to memory of 2700 2248 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe 31 PID 2248 wrote to memory of 2700 2248 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe 31 PID 2248 wrote to memory of 2700 2248 691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe 31 PID 2700 wrote to memory of 2788 2700 EABC.tmp 32 PID 2700 wrote to memory of 2788 2700 EABC.tmp 32 PID 2700 wrote to memory of 2788 2700 EABC.tmp 32 PID 2700 wrote to memory of 2788 2700 EABC.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe"C:\Users\Admin\AppData\Local\Temp\691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\EABC.tmp"C:\Users\Admin\AppData\Local\Temp\EABC.tmp" --pingC:\Users\Admin\AppData\Local\Temp\691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.exe C77A1684DD6E1FA49C7A1DA498D45A4E9DADFDFD7A6A8E16F7F11D444732802293DAA3C7E4F8C26E7B4D9D66D9576D929483A41937F1E2B5045AE139B6C7776E2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\691aefc500ec346de36a806ad7bd8ca051f98798fe863f2b1b1860f5c4a19492N.docx
Filesize21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
576KB
MD5889951de75272195e62d95c2812eaea5
SHA18a7928097fadb6749e8242d257fb498168c3f8f1
SHA256820f748d399c46fa570dfab2b11ff74e49fa48040ba01a75f6e2f4523c5d35d2
SHA512e7cb6e36eafb6fc56e994d8f4ee4a10d16680624577ecaffab0d3cd03f8af281385dae8b7e26b314a8000e472901779335c3e677354218a0ec5863a9c5bf2216