Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx
Resource
win10v2004-20241007-en
General
-
Target
049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx
-
Size
10KB
-
MD5
ce5512a94aa59985b3b8f371a0866da0
-
SHA1
0dfb6f37eb2eb1badb8ab9c0754de0874f4fcfd4
-
SHA256
049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309
-
SHA512
eae07e86ae5dfdd15cdf74dcd2a17502cb8e59fe51aa1d6f64c8a7a14fee8a435f9082a25c9e0566a47765d992037851bc929c5eb53ca80c461327d0a3c973d3
-
SSDEEP
192:ScIMmtPi95kG/bGv7m7sOVIOdBf0krFnuTE3dz5b:SPXIBGv7jOVjvlrFnuInb
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\Common\Offline\Files\http://cml.lol/5x2klu WINWORD.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1916 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 WINWORD.EXE 1916 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2996 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2996 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2996 1916 WINWORD.EXE 32 PID 1916 wrote to memory of 2996 1916 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\049261b1ba10fc409cebee2220f6c16b66a24d45fdf51a8613c6be0870ff2309.docx"1⤵
- Abuses OpenXML format to download file from external location
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD55c9a640e91d3bf4124bdbcdd08f8f569
SHA1b77303789fe22ef2ed200be93ef72fc72ebbef3b
SHA256fc67e3dd99539cc180719ac328de039b9273ed305ed4df9979bcf7287a43de7d
SHA512a905ad2ba7e8b7f49ce883926c0a3da8a33f4772fc9033ac88fd2951f72272a0c285c60a61299aea951f998e6e4d8aca052c053e722fc78b21c99e36e6b5880c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\5x2klu[1].htm
Filesize23KB
MD5cfc39aea170ca3b4e33d2c2966b074b1
SHA15ef963126b302ff61c6087751e2e4be10074ce7b
SHA256d8f0995eb3229a74c6a584363a6b2f4dd0ca90e1828207570a538ed0459d5cd3
SHA512a0ec7a4ab0dc9ea381027fa389b8dd0b6940136a90858afafe38efea629d8c89000bf8c595541de6cd48c8367e956b260d6272f79dfb9a3eedc1370e6f61f984
-
Filesize
46KB
MD55a2c392e7acdf6e9de6e00129500503c
SHA1c8d0f80381e4ce180b5eb3c4c98539907292a7bb
SHA256878da09a057ec8f1775cdc522e5f7ec44966df547a87a9c29826ba114833c24b
SHA51252223b04eb9121f05442dbc48519a95fdabb81c414772ee43dc837b58f797b97314796ef6d77ea6b7a1f3fee5937ec039e617fcdf8b146822792accd2534e141
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
128KB
MD551dcbe3fc955602ea494e3b966fd5a59
SHA1bebd371606da04e607f7515abf6b28024a6d840c
SHA25653a41a432fd70a6f50be2739f4c4dd5239f7fd70278d0c165653d7316909e823
SHA512fb768549cafd4d7154ee8c9e7693d3b468a2d772a7bc3432b86f204511a8922dda87ca03e4d25fc7dae31157bb04fc70311a94daa05719a1e5888f4808c3e5c6
-
Filesize
365B
MD5934e3e4de5b2af6f041525ca7e0d2161
SHA186f566557a5830890cdc9145ee3c25c2d7f07040
SHA256683197ebf6edbad2b098086574161f38ca3bdd39005e04202243720242e48d19
SHA512776b362a6a10f21834b36e295c5e0179cea874f9dd2559e6b79a4e130a0a29a6cc108ab5267f3d95151846435431e34e8eed82e0a1ec5b49945f35437b72e7ac