Analysis

  • max time kernel
    33s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 21:43

General

  • Target

    6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc

  • Size

    49KB

  • MD5

    18d4a1198b787ded87086c77dbb0b81c

  • SHA1

    94c553717ce3cd22fa319490e84689ebd17024c4

  • SHA256

    6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951

  • SHA512

    bbe7266bc94a0b2bd95ef962dfdf36503da378e580ca91c363a68125b802ef5013202f70797ca445b96d5c1887e9b35493272be026a10631e78a29da2052b4cc

  • SSDEEP

    384:Tcx6TNFHiSoqONljlX2EZtRsdF+pC/KBh50jQ:YizCH23+pZ

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.230.135:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a69158fd60658de3fef73faed168c37943382faa9208025c0f4e13115dc0951.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3772
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:3328
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 3772
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/820-16-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-3-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/820-17-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-2-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/820-7-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-6-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/820-4-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-5-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-11-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-10-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-9-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-13-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-12-0x00007FFF4BE50000-0x00007FFF4BE60000-memory.dmp

    Filesize

    64KB

  • memory/820-15-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-58-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-1-0x00007FFF8E58D000-0x00007FFF8E58E000-memory.dmp

    Filesize

    4KB

  • memory/820-18-0x00007FFF4BE50000-0x00007FFF4BE60000-memory.dmp

    Filesize

    64KB

  • memory/820-14-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-8-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/820-32-0x000002208E690000-0x000002208E691000-memory.dmp

    Filesize

    4KB

  • memory/820-33-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-34-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/820-0-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/3328-41-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-55-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/3328-54-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/3328-53-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/3328-52-0x00007FFF4E570000-0x00007FFF4E580000-memory.dmp

    Filesize

    64KB

  • memory/3328-56-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3328-40-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

    Filesize

    2.0MB