Analysis
-
max time kernel
58s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 21:32
Behavioral task
behavioral1
Sample
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
Resource
win10v2004-20241007-en
General
-
Target
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
-
Size
222KB
-
MD5
202fe901eec6ef893f5f8d86528e5d54
-
SHA1
1ded84a8c931c682d21fbc3c5802eff21e336f0e
-
SHA256
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2
-
SHA512
13f64d4af37a5f19526384113a587c690fea24fb05307c15a81125ff5b34c05b08eb27b88f67fcde470c3ebfa172f95f817f5c73252744bc81932496380c88b1
-
SSDEEP
3072:zVIfFuR6AqFMa2fL3NtkWL90y7K4mlQCww7zDTW6HNRn0nPmaw:zVIf8RsOtZclptz78Pk
Malware Config
Extracted
pony
http://fouseevenghedt.ru/gate.php
http://biledroben.ru/gate.php
http://rohironrof.ru/gate.php
-
payload_url
http://eloraestate.com/wp-content/plugins/prism-highlight/opera1.exe
http://edmontonlimo247.com/wp-content/plugins/prism-highlight/opera1.exe
http://dgfcomercial.com.br/wp-content/plugins/prism-highlight/opera1.exe
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1444 8tr.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 WINWORD.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 8tr.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8tr.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 8tr.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 8tr.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1444-93-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/1444-98-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8tr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2076 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1444 8tr.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1444 8tr.exe Token: SeTcbPrivilege 1444 8tr.exe Token: SeChangeNotifyPrivilege 1444 8tr.exe Token: SeCreateTokenPrivilege 1444 8tr.exe Token: SeBackupPrivilege 1444 8tr.exe Token: SeRestorePrivilege 1444 8tr.exe Token: SeIncreaseQuotaPrivilege 1444 8tr.exe Token: SeAssignPrimaryTokenPrivilege 1444 8tr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2076 WINWORD.EXE 2076 WINWORD.EXE 2204 WINWORD.EXE 2204 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2940 2076 WINWORD.EXE 30 PID 2076 wrote to memory of 2940 2076 WINWORD.EXE 30 PID 2076 wrote to memory of 2940 2076 WINWORD.EXE 30 PID 2076 wrote to memory of 2940 2076 WINWORD.EXE 30 PID 2076 wrote to memory of 1444 2076 WINWORD.EXE 32 PID 2076 wrote to memory of 1444 2076 WINWORD.EXE 32 PID 2076 wrote to memory of 1444 2076 WINWORD.EXE 32 PID 2076 wrote to memory of 1444 2076 WINWORD.EXE 32 PID 1444 wrote to memory of 1104 1444 8tr.exe 33 PID 1444 wrote to memory of 1104 1444 8tr.exe 33 PID 1444 wrote to memory of 1104 1444 8tr.exe 33 PID 1444 wrote to memory of 1104 1444 8tr.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 8tr.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8tr.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\8tr.exeC:\Users\Admin\AppData\Local\Temp\8tr.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /K3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50ed5bc16545d23c325d756013579a697
SHA1dcdde3196414a743177131d7d906cb67315d88e7
SHA2563e430584cd9774ea3b21d8e19b485b48212fe356776158dd5f3c5f63a5bde7d3
SHA512c93072d11058fa50e3b09ff4da9f3dbe2637c2b5df05e616bd8ddd04557ea1e8b0db106b1545fad334619118c467776f81cf97ca52d3f2fcbbe007f30032b8af
-
Filesize
802KB
MD5001bee5c1bcb9a7512248e7a7eed6e17
SHA1b007a07a27178b712b73616136a80da89963e216
SHA256426c7c0f45b72d648fd956724c661b1c61e6948a5ea631fcafadc2526cc59d6d
SHA512d755731490b9d6b8d1747de1b3fba29840588003fd4c25baaa414ccf1178ebf4b7515a8b96f18196ec0da28129080e0a9ac3901729fabe3a4f68e249050c3703
-
Filesize
802KB
MD56e15da8ed20eddb7e4a2fdecba6b8dac
SHA1b9300634c4c4fe17e1faccc04086ef7140eba533
SHA2567bc2941c7e3de1c6aae780f05b9a542b0e2150116cdee2c329c2991983841b58
SHA5125a789a7ef9597c553cd663a47fca084c2d9bc2992c74f6dbf0707750235ba38f9e42d8f30666269529d401545a192e5d4444d6a40a0700d190ced4f76c5a2af5
-
Filesize
19KB
MD5eca36645a13cc72edffc07e75d33a5b1
SHA1eecaa55430a29b10afbaf88769f5102370452de5
SHA2562e69414431b2928a9d3b69cd91bc494b9d9b1e6dd2d0d89c02c9415b2e1380bf
SHA51264240f296f811158c3dafe418fa10f0a901f67a13e95b40320b99a176aa64fcb3c89c896051f94b1cc0cf279e5c31ca6ca4b0f509467a37b78cb20e67dee808d
-
Filesize
178KB
MD5c028f68109fd975e9aed790087fe1457
SHA18086b95ae4f58529e2941aa4c532d8c584af1024
SHA2565c05db8164a6d51dd483cbe8eddb1d0c21aecf432ef75f5dc5a0a2fc0b711657
SHA512d22c6fe16c97890866f12ca1c7ab98d6242f997e3b84a2ced243830079693d7896f9bf7374a4c54e6d4155fa838b91064794918e5840805f58c72e619a54da02