Analysis

  • max time kernel
    111s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 02:55

General

  • Target

    cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5N.exe

  • Size

    72KB

  • MD5

    25cea2bca9227df08325d74ecf2f15e0

  • SHA1

    c1f674ff91433f57b2f96f81401ef9d00f1ea167

  • SHA256

    cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5

  • SHA512

    c5b861e7e38d539b73e509f30f7552de4eb19e955271a1b6637bf7d19b6b3bdd3bc5afdce3c79690061db0ca0e43d9ee32bd54c7f8ec74a3031f0f81062ea3f5

  • SSDEEP

    384:M4/vz74WB+wk15BdQdeAuVzhTH+gp16bD0M4A7OxUB4N7CoWGIeWJywmMe0jeabY:d/vz7fUS8AuVzhDhXmj4A7O/CorFP

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5N.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2648

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\cd184a4bfa9b07039f14d578bc722cbcd7349cd564c6286757f7469dc3d277b5N.rtf

            Filesize

            3KB

            MD5

            9fce3b0133ad2796442f5a0e18b681a5

            SHA1

            5972e80cc00e89be846692540921c5dfeac5d017

            SHA256

            8ae683fa2b323bd63bee7040b41f1213b74ea05526972d52c210b8b2110ccead

            SHA512

            04ffe802cbb0383df1825985e11025f1cc53de8d68ca38525ac5fdcd266f6f4bb1858f78a1317c3857f891527fc18a95e48991d6f6e1fe36cdca2d7aebfdb40b

          • memory/2232-0-0x0000000002130000-0x0000000002131000-memory.dmp

            Filesize

            4KB

          • memory/2232-2-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/2232-3-0x0000000000401000-0x0000000000404000-memory.dmp

            Filesize

            12KB

          • memory/2232-13-0x0000000002130000-0x0000000002131000-memory.dmp

            Filesize

            4KB

          • memory/2232-14-0x0000000000401000-0x0000000000404000-memory.dmp

            Filesize

            12KB

          • memory/2232-15-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/2232-16-0x00000000050E0000-0x00000000050F1000-memory.dmp

            Filesize

            68KB

          • memory/2820-7-0x000000002F0D1000-0x000000002F0D2000-memory.dmp

            Filesize

            4KB

          • memory/2820-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2820-9-0x0000000070EFD000-0x0000000070F08000-memory.dmp

            Filesize

            44KB

          • memory/2820-17-0x0000000070EFD000-0x0000000070F08000-memory.dmp

            Filesize

            44KB