Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
cf15660747b9ffda42a8fb754b18c70d0e149bb255d43d95192f11fb96a4bc6b.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf15660747b9ffda42a8fb754b18c70d0e149bb255d43d95192f11fb96a4bc6b.docx
Resource
win10v2004-20241007-en
General
-
Target
cf15660747b9ffda42a8fb754b18c70d0e149bb255d43d95192f11fb96a4bc6b.docx
-
Size
657KB
-
MD5
824ddca1c906cc1a41542add075d4350
-
SHA1
da9a6b8b0d7e8423d05878e8b8666aae5fe7239d
-
SHA256
cf15660747b9ffda42a8fb754b18c70d0e149bb255d43d95192f11fb96a4bc6b
-
SHA512
ad849f623c55b7d2f1a22f0000c5af0d99b7e2eba291b4afa53af2288696743aac98c42cda13f2e6e36d68b8a07ac5599881fbadbb60274cb7e8d9a6c7fdd292
-
SSDEEP
12288:v7Sa26wMQntPzC/OHuAGiXWFHhIu6UCuHVj5vxu6aXHRMoh+NIPZIlpbR:OODQtPzC/WV896U3VjOX2gtOlpF
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2100 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2100 WINWORD.EXE 2100 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2824 2100 WINWORD.EXE 32 PID 2100 wrote to memory of 2824 2100 WINWORD.EXE 32 PID 2100 wrote to memory of 2824 2100 WINWORD.EXE 32 PID 2100 wrote to memory of 2824 2100 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cf15660747b9ffda42a8fb754b18c70d0e149bb255d43d95192f11fb96a4bc6b.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5da799abecba76f601cf106155c4a2381
SHA1acbafd67377395a11934d559cd476109c6530405
SHA2565a483ce111284708dd3eb385711dee70faea182a015234504235837c28e7c882
SHA5124e89db8ba9962d69c84599916be7651272380d74dcb455985331812f1e1a03c2b22f007f19890eb5cc7d36ca1d65814d1e5fefe7713cd23c55edbb54802b8ac8