Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe
Resource
win10v2004-20241007-en
General
-
Target
185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe
-
Size
36KB
-
MD5
29531987c48a00c66e5d7c64109a1950
-
SHA1
121c1fb0094519852e926e754df3127c46a505ae
-
SHA256
185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473
-
SHA512
448f1dde3ff1551298efad9fa4c1336397bc5974431684f6da4058deb9787178cce1c76484d5a3132cd94ae282f14fe9376357c3c3719e23e737d39661a45e1f
-
SSDEEP
768:MmgCshhfOEnaMdtFFRKMElv/+e+VmXH4oE1a:MmgCoZXVpEdoqHHE1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2724 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2724 WINWORD.EXE 2724 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2724 2676 185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe 30 PID 2676 wrote to memory of 2724 2676 185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe 30 PID 2676 wrote to memory of 2724 2676 185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe 30 PID 2676 wrote to memory of 2724 2676 185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe 30 PID 2724 wrote to memory of 3020 2724 WINWORD.EXE 32 PID 2724 wrote to memory of 3020 2724 WINWORD.EXE 32 PID 2724 wrote to memory of 3020 2724 WINWORD.EXE 32 PID 2724 wrote to memory of 3020 2724 WINWORD.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe"C:\Users\Admin\AppData\Local\Temp\185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\185931b7fe0577c369518de8d013d53c144eda7faa5cb0d2e31d4d77f9c8d473N.rtf
Filesize4KB
MD5cce1ee2eca38ec5cca3a1dc883ca815e
SHA1447b3209541feb29aef0e8150367f1e9d4777ed5
SHA256d44903105c844b08ebe0822d97c64fb70e7da14fb327ae3a2cad4059d4e10d98
SHA512514b4bce268ddc79696334fae0dc642a97c2582b80648c1ffcd347beed2c70789f7f690eab8c4ed1398492bd1d8edf3e46cff38e22340130fc52d76943583acd