Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
ableword.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ableword.exe
Resource
win10v2004-20241007-en
General
-
Target
ableword.exe
-
Size
3.5MB
-
MD5
d23388884fa7dcdf411d41c644b4685c
-
SHA1
c9db8e02dd47f10349b7e8a35843044411e83855
-
SHA256
aad9179f810a43fe5cb1e54a3cc22e31d234d0e63858c95ec06fd42b1dd1042a
-
SHA512
4c12e6057665e9f92c70575d1994b118d957044453b18f407d0b30831af1ff209a2fb262fe9d87aca23e33b9d8d55e548ee1bd9f722031f348513d27be1469ea
-
SSDEEP
98304:N82Xs/CVQlI7XU9B8TR40gxuBSVdFnM5Dds:vYp9BiR4XBVvnAy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 ableword.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ableword.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ableword.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2580 4584 ableword.exe 83 PID 4584 wrote to memory of 2580 4584 ableword.exe 83 PID 4584 wrote to memory of 2580 4584 ableword.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ableword.exe"C:\Users\Admin\AppData\Local\Temp\ableword.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\is-G7685.tmp\ableword.tmp"C:\Users\Admin\AppData\Local\Temp\is-G7685.tmp\ableword.tmp" /SL5="$6029A,3373878,54272,C:\Users\Admin\AppData\Local\Temp\ableword.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD5c49b0148cb58b886f60cb32eb5e81439
SHA19c64093d08c5ea02a3622f2b616546d3c67a2360
SHA256fc13f965789a342dba0784492c2e2797ab92bdeaa6532e125b04be81675c0810
SHA51270968fa616ff38b39e9b266c38f99e4b25a749d5f84706c3302e2e218cfcf9b18cc8bd2017d630ed27fc7e291a748477f23bb9d447745654d06ca58845ea918b