Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm
Resource
win10v2004-20241007-en
General
-
Target
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm
-
Size
83KB
-
MD5
5c598af465c80c34768fb84ed8e5be07
-
SHA1
a112304563fc6aa0132f2f5d396c6438849a836a
-
SHA256
7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680
-
SHA512
0f6664e279645e2f2b39239afca6982c4d8c69e2fd2c80617897240fa37c9d2fa0e09b347655e505db54b70b8eb6f646fa1096fff76c8db470fcd251ada4b7b3
-
SSDEEP
1536:UX+WqQuctgdEmHVJZtQ1tSW+fIwMyPiEHB8nrdFIILILBZUymgicOXClW:I+X8YdDZFM0iISrdFjEBamdOCE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
radEE318.tmp.exepid Process 5028 radEE318.tmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
radEE318.tmp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language radEE318.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 852 WINWORD.EXE 852 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid Process 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid Process procid_target PID 852 wrote to memory of 5028 852 WINWORD.EXE 88 PID 852 wrote to memory of 5028 852 WINWORD.EXE 88 PID 852 wrote to memory of 5028 852 WINWORD.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7cc1f9b3600a2c34b40fe42117b8ed678eca91312730d8435def4b356037c680.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\radEE318.tmp.exe"C:\Users\Admin\AppData\Local\Temp\radEE318.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
72KB
MD5478827ae8aed91b877dbf1fb178eb7b6
SHA182f8f9e5eb9acf652dddd73f9a3b328ec0e76e9f
SHA2569ff743bf5e93230cd77b6651ef9dd506c21dca7e07841de241db0f940b28c53e
SHA512794ede00a1d332b09957624fc4070bf075c49247ce5ac0c923dfd5863a51bb183bfbfbaffa1c7a31a8d7e5287a61d4bbbe22acb38bd9bbcebf4623918c9d51fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5d8996e967cad9393edd79ebb7e2232ea
SHA1066e3318dfacb367bb6ae8a0fb3b51ac5a26d35e
SHA256a006858b733ca93a61d3e9a5ee5fa85bd46be37c8d64b99d26883f0033fb388e
SHA5122b619c3aa4e0f6b0b2c0f3da1f2f05159be9382358bfa2fcccf3e30691107272e8ffe6e425961f2e086b00c241a92a306d307884f3ce8cefab8ff3bb3cfb1443