Analysis
-
max time kernel
127s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
Resource
win10v2004-20241007-en
General
-
Target
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx
-
Size
84KB
-
MD5
e8eeca2b17300555ce982ae3368ea55e
-
SHA1
18b108ab1f73ef5e7ff61a2d3e0235976e412081
-
SHA256
b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110
-
SHA512
cf9b2462b907438c33d96aaf82238d45e4bbe2d771bf97122fc774112f46bd0e568e4058df65b7dd6d4096043470265175b2df2c8b914de20b3c79d005433fa4
-
SSDEEP
1536:aYtb7ih7kPw17kG1hc2FjOppzOYN1TThLdvV5brdSp2:aYt3ixkw17kc/OppzOYH39JV5brdSp2
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2376 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2376 WINWORD.EXE 2376 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1992 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 1992 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 1992 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 1992 2376 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b39cc1ce2d546ee6683e73264aaf094f4dd0ddae3b77bba5e3c0384523e66110.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{15B7C0C7-60B4-4B08-A6E8-C80185D74D6A}.FSD
Filesize128KB
MD543855e9b7a5f2568073cd620e05dfbb7
SHA1ddbbab0a24dd2b36404e2449a9841f6f3bc7bffc
SHA2563b67f2ec4032720b329e761406cf05c45f942ef2b55e71cfad43391bbd313994
SHA512672e08af6c74bcbdd8d7c32a68f401ffcdbe86950c9e16111a333751ff8ca1c454dbab09336c4a228348d7728119e66e88491d559e59c8ac23aada393d311dde
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD56ccb995c3ad399a46036bca9c54b9a7a
SHA1b8c205f30053eb8c9b514f1f0d21851fb9e6ce25
SHA256858ddf2a872b4b7a1151f675c4767e5520bea78d4beca4e23ba80d2c746290d1
SHA512778b68f55f4efa752f751522c9701a755c85d34102eec0b412347ee07b1c6ab637b854aac4c51ed9cb1c32ca873278a74773780ae785c87a47e7e4f19e59ac64
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{6F1768CC-FF79-40DD-AFDF-675120E2082E}.FSD
Filesize128KB
MD5b32327ccf42a1f556846ccbb139ce916
SHA1d3b84bba2d4feb166948641e677b7efac3f2b263
SHA2561e70ffbc11f59b8b92d5c4f24a52115ef736e25a251928ec09cb3a3853440045
SHA5124f33dac0387ecce07019012de373b74a52f96d71549f65c6baf0d98dc9a1c92ebc1eaea98b2c5ab72da98e091e36aad490684a43846933d00f1980029d1d2f47
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\TtzpZ[1].htm
Filesize3KB
MD531d56d865881b09d6c92f5f8f69d6634
SHA1ad629a539b2e6b86bfd90b745e8176c9f58b702b
SHA25673fcdb91d1fbcf1b5e5353af5c3105bfdaaca5a2e4b2dc698135e4820c097921
SHA512e26d948f5fce36c67096594b7a639ae95dec5b8d69e2ffedb59113145b55b7de39186e10787953e303e34fcdcfdfa9c8372b15886f7f815a8418da7220820ef2
-
Filesize
4KB
MD5e5c61878b60131a6ac8e94a80597f81d
SHA13b730bc3bbf3e56de4caa2389eac17bac1ad6997
SHA256194f8974284cad509d798f11b1104d9dda63a550078e29c0725dedfb302024b1
SHA51230ff13f4dd0153bb426c3e101a57524e7f29f1a2be879d0257f87a47eff8c2e069deadb064949b25b5e4200b5880645c8b71b5fceaec7be002b4d6c1f46fbd04
-
Filesize
128KB
MD5b45d32d765ed9024ebe3eaa225804138
SHA1f1566dff01b2537f547124676d319090b81e4783
SHA25657bebec1b97028ce080889909eb880237ae1e53f4b8f4934153ceef33f517f76
SHA5129541bb68efeb16a90a8c882990f6fc01208f8555b01819bcec0e82e473c29fd5c03ad6823a98a0f6a1f5536973cf052dc84ec70a432dba8c6d1a1841878d9735