Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
ableword.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ableword.exe
Resource
win10v2004-20241007-en
General
-
Target
ableword.exe
-
Size
3.5MB
-
MD5
d23388884fa7dcdf411d41c644b4685c
-
SHA1
c9db8e02dd47f10349b7e8a35843044411e83855
-
SHA256
aad9179f810a43fe5cb1e54a3cc22e31d234d0e63858c95ec06fd42b1dd1042a
-
SHA512
4c12e6057665e9f92c70575d1994b118d957044453b18f407d0b30831af1ff209a2fb262fe9d87aca23e33b9d8d55e548ee1bd9f722031f348513d27be1469ea
-
SSDEEP
98304:N82Xs/CVQlI7XU9B8TR40gxuBSVdFnM5Dds:vYp9BiR4XBVvnAy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2552 ableword.tmp -
Loads dropped DLL 3 IoCs
pid Process 2240 ableword.exe 2552 ableword.tmp 2552 ableword.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ableword.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ableword.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30 PID 2240 wrote to memory of 2552 2240 ableword.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ableword.exe"C:\Users\Admin\AppData\Local\Temp\ableword.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\is-NRFI1.tmp\ableword.tmp"C:\Users\Admin\AppData\Local\Temp\is-NRFI1.tmp\ableword.tmp" /SL5="$4010A,3373878,54272,C:\Users\Admin\AppData\Local\Temp\ableword.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
687KB
MD5c49b0148cb58b886f60cb32eb5e81439
SHA19c64093d08c5ea02a3622f2b616546d3c67a2360
SHA256fc13f965789a342dba0784492c2e2797ab92bdeaa6532e125b04be81675c0810
SHA51270968fa616ff38b39e9b266c38f99e4b25a749d5f84706c3302e2e218cfcf9b18cc8bd2017d630ed27fc7e291a748477f23bb9d447745654d06ca58845ea918b