Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 22:30
Behavioral task
behavioral1
Sample
2023-03-08_1254.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2023-03-08_1254.doc
Resource
win10v2004-20241007-en
General
-
Target
2023-03-08_1254.doc
-
Size
515.3MB
-
MD5
56fa3a6a45a6c48a6582c8ce100cb094
-
SHA1
79fa05d995a6dab74a6b85259ad83533fb4ecd08
-
SHA256
b4337a636049658bd281de947f0357e33efa17f3f80c3904d959cf6777df001d
-
SHA512
c65a4eab76532c4ca48eefe5814affc614b990eb2eac3e7cbcfe308ef9f0521382c9562be5aed5c338ddb9d761c3da66eda9de4638990c794bd33bc640252b35
-
SSDEEP
6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2872 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2872 WINWORD.EXE 2872 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1076 2872 WINWORD.EXE 32 PID 2872 wrote to memory of 1076 2872 WINWORD.EXE 32 PID 2872 wrote to memory of 1076 2872 WINWORD.EXE 32 PID 2872 wrote to memory of 1076 2872 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-03-08_1254.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1076
-