Analysis
-
max time kernel
47s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 21:34
Behavioral task
behavioral1
Sample
6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113.doc
Resource
win10v2004-20241007-en
General
-
Target
6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113.doc
-
Size
222KB
-
MD5
1a9d520dd9a594a0e27bd75e0bed8fd6
-
SHA1
a55f6eb53742665288bb6691e686ff98771f8b84
-
SHA256
6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113
-
SHA512
def5c37116a35172b8f786ad31f2b9f0523d93e7897805a3674d98c92cca7205bb94a5682aa3b6f5bed6e76d0a8584221db1b536bba5140764411b6aac83384f
-
SSDEEP
3072:zVIfFuR6AqFMa2fL3NtkWL90y7K4mlQCww7zDTW6HNRn0nPmaw:zVIf8RsOtZclptz78Pk
Malware Config
Signatures
-
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{4230BF66-58D0-4A3E-ADAB-4B8E0A2C8016}\8tr.exe:Zone.Identifier WINWORD.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{4230BF66-58D0-4A3E-ADAB-4B8E0A2C8016}\8tr.exe:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2888 WINWORD.EXE 2888 WINWORD.EXE 2864 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2888 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE 2864 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2316 2888 WINWORD.EXE 87 PID 2888 wrote to memory of 2316 2888 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6ade703e01e1f599ca3e5686760aa1c200d975df13ed50bf829bbd1fa5e74113.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2316
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize471B
MD5b972dd67952580fcaf7d49802d206a55
SHA1386c6729fb12a5e796bc70518b41ece5f5a58165
SHA25696ecc543a87a4a5ef2f69a1200a64ff12e34a8e660a12e568be97c9f114e9eb2
SHA5120e74929d46c1455043104117cca1c05a63e857987e73990a5cdbb3c10cfc0985d9df3b0bbdac4befe8b796d19f602c1487411250373d7d5b1af30e4fdca3d4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize420B
MD53d06a952da2fd5ef113542b9c8422405
SHA14ccba16406f774a17a718a292d3ae6793221c6e0
SHA2569b992e1835fac37b6d6b7de56b1e25bf9c80baac8a213f4867c1a40cbf81eb89
SHA512d6d3bef687f1c7697d1f8a7225082aa71d1f79b47da6f3470cc79c9da3c32488abb57fa2933c554714d436f88b68cb63579000408698ff974ecf59e72724a6c0
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\4FB88EED-5585-4560-8D43-691625D9CCF1
Filesize172KB
MD5261615c021f5cf4b03b022bd503d149a
SHA12c159b30990ce9fb704cf9d6e7cddaa859f64818
SHA256a3da0c917aea7ce67fae31863de1aa9296c5c2708625e33e69225942d924597e
SHA51296a7ecd589325adae8936b1f71f254145961b82aef83a3452bcf2f638880ed374456524dd7d1473945cbc59d41f1d45b63034a5166f3e1d486b368c5e77a2980
-
Filesize
11KB
MD573a70c5b052bcbd1da29732963a33308
SHA1263f256ec61726693b27cbabf664995b48e51522
SHA256c72b24167ef491ffb68e0cbe81435679d325689811b45e0f53e05cc18ea7b701
SHA5124f638976d0988a4d1ed489d1a41d10381e18d4705ac5c269fdac2c4c13704ac7fbfd7660a43afe8953a13a98cd477c8ff1fb3832d0832ffd2d31cf8475c03c27
-
Filesize
8KB
MD55114adeaddde0979d6856d0358585384
SHA1e75125df475093d4a26717e1729a1ffbbd22ef4e
SHA256d0cc84fa66a4b20792bb6fc13942dc444eca69508d84956f03667fb05cc120ee
SHA5125be764e445b1f1853752244c173cc17e75e5a7cc1a181e3153a96f9f8bcfdc6e4c946527a864dcfcd0553910755b3c4ae1e062f9de270605dd87893a073813b1
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5bf1bb17d98f30b558e831cb0ab03212b
SHA11f09d8d83785c5f2a7c2a7ff7f722a97515f8ddc
SHA2563bfb4851bcf3f229f10f1ff39a03b60207d85bee045820e57d02082cd7aae05a
SHA512046646b71bdd58bc15148c7d3d2515aae5a9949b5e9c7d617203535b521262fe19686a8c1e0b13046517b39083e7212af6ffcc91d86486e4bd995280b3c1553b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD57554c7288ae334b34e26e0990a4f86c6
SHA10b80035fae47ded6210be691beed3f34935e3f6a
SHA256dd0b32d29ad0f34e77e58ee652764fb8e380a1afb66f9188179d521218bf9642
SHA51261039811724a23e6c0a2765edc38a56f5d1214551ae2679e0b28d17da1823da68c5deb59a2d77c1d38203ce235717646d2439ceb8fb4e004bfaeb4102d50f4d9
-
Filesize
5KB
MD50ed5bc16545d23c325d756013579a697
SHA1dcdde3196414a743177131d7d906cb67315d88e7
SHA2563e430584cd9774ea3b21d8e19b485b48212fe356776158dd5f3c5f63a5bde7d3
SHA512c93072d11058fa50e3b09ff4da9f3dbe2637c2b5df05e616bd8ddd04557ea1e8b0db106b1545fad334619118c467776f81cf97ca52d3f2fcbbe007f30032b8af
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
816KB
MD5dfa92b235e1d6930e74141c5c604cb9b
SHA1d2e3aa018347e9d3585c0f1bf90d80f87ca2172c
SHA256317b547bd7cbb250b7bb9e414069017076e06b98dfd5d38a73b9417710c48cae
SHA512625a8a0ddd7638bc4c5393f564f7f5bd2670cc071b634518c7f66f18453ed9d77280ee9a23f85584e6177060e94077fd180f8317938e773582a9b98a9f71d669
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize4KB
MD52beb3e202f324c4ae9e8abe37ca81fb9
SHA16c8660c6e34b90d3241f5ef6d7140f17b097da7f
SHA25606a73b7c5bd1c95451771fabfad5e93f1ed274c95b85a0d9323d9085a71be47e
SHA51226b32c2ce4e67e8988e6263c8d36a4703064f17352bf981c45f2f7dc9feb8b73c7600e53398a5bda90844930eb3313f25bb21f6e9f63fc25b5e93553dc3a0573