Analysis
-
max time kernel
129s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
Resource
win10v2004-20241007-en
General
-
Target
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
-
Size
84KB
-
MD5
e8eeca2b17300555ce982ae3368ea55e
-
SHA1
18b108ab1f73ef5e7ff61a2d3e0235976e412081
-
SHA256
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110
-
SHA512
cf9b2462b907438c33d96aaf82238d45e4bbe2d771bf97122fc774112f46bd0e568e4058df65b7dd6d4096043470265175b2df2c8b914de20b3c79d005433fa4
-
SSDEEP
1536:aYtb7ih7kPw17kG1hc2FjOppzOYN1TThLdvV5brdSp2:aYt3ixkw17kc/OppzOYH39JV5brdSp2
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2200 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 WINWORD.EXE 2200 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1992 2200 WINWORD.EXE 31 PID 2200 wrote to memory of 1992 2200 WINWORD.EXE 31 PID 2200 wrote to memory of 1992 2200 WINWORD.EXE 31 PID 2200 wrote to memory of 1992 2200 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD5487be85f723d7ef8dd43f92cfe779db0
SHA11d74ba96d3619c4364f864a285053aed5c4ee439
SHA2563689617f9c0d39fd1596b1fe1596ea1c8ce561ad6f6d02c6ed4a46a477590514
SHA5126a12d28ef8011a9696b9c1056e55f8645730c9e55c889ea0ed7e639379438c25c9103a556d05682b03d150ddd1de49215a1101effb06914ab1a313b57b9ce0b5
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A2C66A4C-D7D0-4C8F-AE8E-DCFE5C1134E4}.FSD
Filesize128KB
MD513e4e3fb89ad2b6ba95845ee6ca5f35d
SHA1bedfa2e3f7be035309c787d9de859ea8fed657e7
SHA256c530572ebd5c9b1301320b6abde2a67bd2e2418707cd44e7d3f26ecd085e1a28
SHA512b23681a99cf97189049a18f0235c45a17667de8b75ef1aef332735dc48834ce9e713b07084ba281912f0fe9847f589e5e3b7bdaa4884ce45e8f87010c5a40e30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\TtzpZ[1].htm
Filesize3KB
MD531d56d865881b09d6c92f5f8f69d6634
SHA1ad629a539b2e6b86bfd90b745e8176c9f58b702b
SHA25673fcdb91d1fbcf1b5e5353af5c3105bfdaaca5a2e4b2dc698135e4820c097921
SHA512e26d948f5fce36c67096594b7a639ae95dec5b8d69e2ffedb59113145b55b7de39186e10787953e303e34fcdcfdfa9c8372b15886f7f815a8418da7220820ef2
-
Filesize
4KB
MD5e5c61878b60131a6ac8e94a80597f81d
SHA13b730bc3bbf3e56de4caa2389eac17bac1ad6997
SHA256194f8974284cad509d798f11b1104d9dda63a550078e29c0725dedfb302024b1
SHA51230ff13f4dd0153bb426c3e101a57524e7f29f1a2be879d0257f87a47eff8c2e069deadb064949b25b5e4200b5880645c8b71b5fceaec7be002b4d6c1f46fbd04
-
Filesize
128KB
MD537764756ead9901a80560305909db4fb
SHA1191e1d59952079d412a4c7798fcdef4afd09fd71
SHA256d755d5fccf9fb1c8679cdb34ff8b31d2f491010d1ebdbf0a12b075f53bc6a847
SHA51207e51e2d50e8b0c425ced71bc8b11b4d86116330cd2d5619d56a63fa7beeaa01233022499c2aa2b053302b5d86e05bbe4dc44570c6d3f26b568d6da11ef898e0