Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe
Resource
win10v2004-20241007-en
General
-
Target
25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe
-
Size
2.0MB
-
MD5
dff50956be43d791baf2f61bc96a56dd
-
SHA1
ca6fa6de7bf577100cf1a0aa34dea5b30d49c9ba
-
SHA256
25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3
-
SHA512
ff66a8025e069c327a6e0993a033d821dad74e3af7835402b0bfa8a4067eb0090450a54030dcf483c948c0628ac010a528357e69a57cab5b8a68ac6fa422f8b7
-
SSDEEP
49152:WFUcx88PWPOpX0SFufpDNc6dBA0hE+pBV7I9qwMyGc:W+K88uPCHIcf0m2V7I4yGc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 EFBC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2112 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EFBC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2792 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2720 EFBC.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 WINWORD.EXE 2792 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2720 2112 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 30 PID 2112 wrote to memory of 2720 2112 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 30 PID 2112 wrote to memory of 2720 2112 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 30 PID 2112 wrote to memory of 2720 2112 25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 30 PID 2720 wrote to memory of 2792 2720 EFBC.tmp 31 PID 2720 wrote to memory of 2792 2720 EFBC.tmp 31 PID 2720 wrote to memory of 2792 2720 EFBC.tmp 31 PID 2720 wrote to memory of 2792 2720 EFBC.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe"C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\EFBC.tmp"C:\Users\Admin\AppData\Local\Temp\EFBC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 050E9F08E3B2C6F4709479A0D10CF202F6B8E4791D420E055337405776FE764328E2073C988003A589CA63E2F0F669011FE93BF4C1B1E6614AB3968A0182E1B72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.docx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.docx
Filesize19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
2.0MB
MD5bcbc3cf2e1ae4412dbe57ce0de919327
SHA1ae4e42ffbbc9c6fa38e5e203ae109b8fb30485fa
SHA256a1652e88e75880aa5ff30dbb51ef2191a48a82cf4ad1198e5f7dd99d3d7b27d1
SHA5124189dc011852dd5230be1d7afbb9f6221fe0ba1ed67c8704451568309df0aac55897cf1000460015d21fec4a1c58f97298b098d594becdba9e3f102735b4d61b