Analysis
-
max time kernel
66s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 14:09
Behavioral task
behavioral1
Sample
2023-03-08_1157.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2023-03-08_1157.doc
Resource
win10v2004-20241007-en
General
-
Target
2023-03-08_1157.doc
-
Size
548.3MB
-
MD5
df03ab3720154f245c109759ae06913e
-
SHA1
1f4ae4072ca354d3337f578b74b7526f7fb2bbee
-
SHA256
a85fa869a88e0c5464efb2e86ab86b97035374ea96bcc9c59a4fd7f7e3ba5de1
-
SHA512
cdc65bbde648ac2349b566003be8b6f9f9a74c1439f09faa81d0d3b29ff4037be57d9bbb4a2588847b1ac528cec82c5e205ac02862dfd64cac90ea0c0e3d0b56
-
SSDEEP
6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2296 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 WINWORD.EXE 2296 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 948 2296 WINWORD.EXE 30 PID 2296 wrote to memory of 948 2296 WINWORD.EXE 30 PID 2296 wrote to memory of 948 2296 WINWORD.EXE 30 PID 2296 wrote to memory of 948 2296 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-03-08_1157.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:948
-