Analysis
-
max time kernel
47s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm
Resource
win10v2004-20241007-en
General
-
Target
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm
-
Size
83KB
-
MD5
e690c50a4bdfe105c8689e8b1bda9a62
-
SHA1
5b7857d816c1dde669fae82d2eb1b63832968a79
-
SHA256
18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6
-
SHA512
933bfaa2098ab58d7016d8b5fe1989924c9ce93de8ec7bbd5e5ff498c33a11cdde721f196e5e74e0be3edfbb2fa0aaf43550f9e0b15088a6bd6724182cf47b1e
-
SSDEEP
1536:2m+WqQuctgdrmM8o0BE3Nswkj+MB4jUgfASaAQ93MPinoTc0jUg8ifOXCla:H+X8Y3j9scMx5LAYMPinq8WOCU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
radD083E.tmp.exepid Process 2328 radD083E.tmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
radD083E.tmp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language radD083E.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 3480 WINWORD.EXE 3480 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid Process 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid Process procid_target PID 3480 wrote to memory of 2328 3480 WINWORD.EXE 88 PID 3480 wrote to memory of 2328 3480 WINWORD.EXE 88 PID 3480 wrote to memory of 2328 3480 WINWORD.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\18917860a380ce00275fc6e2be1edb1065bd8589e69361822ce8bee9382de7f6.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\radD083E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\radD083E.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
72KB
MD52a9e39689efee1eddcea2f016375375a
SHA163f7ad9f931180ac665ef5a874066a9e1be24ddd
SHA2566ffe63acab0b1661c1010aac53ff85f8326fa3533b9c1951f23dc564145585d3
SHA5128f56b130ba884c8a8addb0de6b40a68189db6752b73016c73dfa815d49a6ede8a089bd3f98fd6ad08833808bb72057afbf3749a659018d33461bdf5bf7993bf3
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD583a0ec943cdfbc2501daadd5ae9d1cd5
SHA1fc6766cdfcd859ec36cd0dc6ba3d552297caaeb2
SHA256b888fdec79a6e7d605fbda0172bd5b5fe45d3792a46ed31da44b42cd5d9894a8
SHA512a42ab000dc706a55749be1ea7804b0c6fec8ec34285292a0ae6ea44d26b63f57f0bc2cf07d9a2f16809c5ab6f7c3cec78675f01ebf7e9e4089e6a82dd3584125