Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
4e52b55a84fd16c5ad7b37ed8ae1211f213390810efb8297b553827124b6bec7.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4e52b55a84fd16c5ad7b37ed8ae1211f213390810efb8297b553827124b6bec7.docm
Resource
win10v2004-20241007-en
General
-
Target
4e52b55a84fd16c5ad7b37ed8ae1211f213390810efb8297b553827124b6bec7.docm
-
Size
79KB
-
MD5
dfbafdb89f97fb33bfff7c7275ed23d2
-
SHA1
237e915f08526de9daf35873defe572d539ec14d
-
SHA256
4e52b55a84fd16c5ad7b37ed8ae1211f213390810efb8297b553827124b6bec7
-
SHA512
d93b0826f999a6896c21b6f0c6313082a86cd4d0494ac9c9dba1b63e6dcf148c02ac9f57241b5848b97ebcf02c0a8a1a3359beb9f433c862149b8446ec818634
-
SSDEEP
1536:5bqmt7l50EldQu6/zohGFGLUcBT86W+yxSPyYR0iXQBYSOXClT:5bqE7vfm/oBTrW+EzYR0CUbOCB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 rad52BB8.tmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rad52BB8.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5104 WINWORD.EXE 5104 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5104 wrote to memory of 1640 5104 WINWORD.EXE 90 PID 5104 wrote to memory of 1640 5104 WINWORD.EXE 90 PID 5104 wrote to memory of 1640 5104 WINWORD.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4e52b55a84fd16c5ad7b37ed8ae1211f213390810efb8297b553827124b6bec7.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\rad52BB8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rad52BB8.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
72KB
MD5ed6f1bf24b3948f800290a419b92c2cc
SHA14d7d5a89d3ccc1c6a05b6a27bcca662637e364d9
SHA2563838d8fa162245559c8a8220ad1eeeab9fa10cfe378c00da1cc913d304c349f5
SHA5127d956838413aa8f567d776a763e860e1b3974e4bcc9014037cd208b551379126e85cbba8767b784edbf73aeae94effe446313cadccd9e4fe19a9f2dfb3f20260