Analysis
-
max time kernel
47s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 21:32
Behavioral task
behavioral1
Sample
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
Resource
win10v2004-20241007-en
General
-
Target
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc
-
Size
222KB
-
MD5
202fe901eec6ef893f5f8d86528e5d54
-
SHA1
1ded84a8c931c682d21fbc3c5802eff21e336f0e
-
SHA256
1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2
-
SHA512
13f64d4af37a5f19526384113a587c690fea24fb05307c15a81125ff5b34c05b08eb27b88f67fcde470c3ebfa172f95f817f5c73252744bc81932496380c88b1
-
SSDEEP
3072:zVIfFuR6AqFMa2fL3NtkWL90y7K4mlQCww7zDTW6HNRn0nPmaw:zVIf8RsOtZclptz78Pk
Malware Config
Signatures
-
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{9955B8A9-1539-4EFF-8906-5852D2B2CD79}\8tr.exe:Zone.Identifier WINWORD.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{9955B8A9-1539-4EFF-8906-5852D2B2CD79}\8tr.exe:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 4496 WINWORD.EXE 4496 WINWORD.EXE 1468 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 4496 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE 1468 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4496 wrote to memory of 836 4496 WINWORD.EXE 87 PID 4496 wrote to memory of 836 4496 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1a65c42dcc0f217a5d4b06b7655d3958db5e33abf4fc6bfdbf88a1fdfcc4eeb2.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:836
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize471B
MD5b972dd67952580fcaf7d49802d206a55
SHA1386c6729fb12a5e796bc70518b41ece5f5a58165
SHA25696ecc543a87a4a5ef2f69a1200a64ff12e34a8e660a12e568be97c9f114e9eb2
SHA5120e74929d46c1455043104117cca1c05a63e857987e73990a5cdbb3c10cfc0985d9df3b0bbdac4befe8b796d19f602c1487411250373d7d5b1af30e4fdca3d4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize420B
MD5aa97e3b84bb909a95a982d6ae99f394a
SHA16ea2fc1850b1e7c4715058f2b2aff2b7ba78a9c4
SHA2567df718b8151c57c5603f098d29743c402d0ca1863c9d631e42d4b69d3f4b5d32
SHA512d7983d689bdfe3b55763552025be77c9259208477f55421ebd3f860e70d2c285549bbeb81d4ab05d5c9f4734d890927897528013be902c95f46a481e40712329
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\0D725AD8-4AC5-4A8C-BF09-47A2B87DFFD5
Filesize172KB
MD58135a91972eaa3a8235d1dfc3eddf105
SHA1d84babcdc8f742f5661b91eef198b725d36489d7
SHA256f19962df528002ac68bc3804100c4a8a6c46f5bcafd3e45648ff7e759c14c8af
SHA512acc3e8fedad3b63403c4a470d23c33fbfc7093fcf6a5f10e6489fdd94de90f41fb427b070c03d8024d6e6011ea01d5841174da42bd11d623cb8e3179e19dbadf
-
Filesize
11KB
MD530164b60a113fcc0bebe3b38937b11da
SHA110a870a975725b56b49e66f5041291b606744700
SHA25602f0aec52c95ff84b9e3de135f4bd5076e9230136f72b73aaf77824bc18bfb60
SHA5127372c90a413d9d54a51b461ffad213f57906074c6e4b12079bc9411105cb6758d327e2cc5ece25ae9a1d97c43caa77b995099c4086f827b5d5fca17ff3dd649f
-
Filesize
8KB
MD576a46669cd2b30165f4209acb22017f0
SHA1de2a7a5f3d6b96c56c0a341a59ea8a71b87e5515
SHA2565b55ec2b5ce46fcbd6bb56865685cf8e4a229b7fc6836d1f511d66536b678f18
SHA512db9a8d58195d0b6398df0fcf6a9e003cc4d7bab54736459043aef6959558e4a4fd01be2a6b6e07269789f587fbc39b768fd04cdcc84340dd64f198335e2714e3
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5063eb6737589b4d02702cabe16abb270
SHA1eab3382ab3215077795e329c7d0c6d29d77e9123
SHA2569b4df4a2228f23816acf633f6691be7f710a184a3948461eafb655ef00f6fe94
SHA51208158b59352cbf0ca017e9b2cdb78f69ad975c2541ac1c0b001e02f37a3e0328409184b6d9d9a0c69ae884c3be146f3d24e8ea427a0fdc36c6c274f64ed2a4d8
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5254236566694b30087e2bee902b47017
SHA12a9652bbd166eb0a0a618fee21d3d9628622d09b
SHA25644b1eac89b5fefdac0b604164e44bf5d46066d41c6a3e16f8d35d8e41a03ccad
SHA5123d5ceff3b0595268d719101da153bbeb06d2dfed628f152289b2ef533da2751a44682c14885bdb8b63729124f4194f56b1f9d2a11753254403fdbec8898fdaaa
-
Filesize
5KB
MD50ed5bc16545d23c325d756013579a697
SHA1dcdde3196414a743177131d7d906cb67315d88e7
SHA2563e430584cd9774ea3b21d8e19b485b48212fe356776158dd5f3c5f63a5bde7d3
SHA512c93072d11058fa50e3b09ff4da9f3dbe2637c2b5df05e616bd8ddd04557ea1e8b0db106b1545fad334619118c467776f81cf97ca52d3f2fcbbe007f30032b8af
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
816KB
MD5094161ce8407dbe8f82c301e168d7ec6
SHA1acaf83d591e4bb42149b65ba31f09b1838c55199
SHA256816ca0d178c917ca62e32b8c8d6f7c3b4108844ea36f74e21d8f9bbd32c648fc
SHA51257ef5f3f8f63cdea6db48c0475a7add185121a0bfe48ed20198f9e89944cdcb871af8117702affa1227cc868ec65a294f90c073dbe3230fce6fb3d1af277f1dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD51c3fd46cba74a416843ca7962f23cb7c
SHA1b6fe35f47b807b1e4aa1f8c37ce26fe22f3fa7de
SHA256a2e10d359486213e214ace85135e505ad4f6765646a9110e4c6ef50298f0fa7c
SHA512e4b4db7a2a978f27ebb180987a9fc9463c659e5ff07d718375ebe15b780300c4c79172855e2a5389aa51faea8b9ab7c4980c092e2b961fae681096643266b3cf