Analysis

  • max time kernel
    52s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 21:49

General

  • Target

    9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053.docm

  • Size

    83KB

  • MD5

    8b953a6aa2ac81a5d0a81d229efbab74

  • SHA1

    b1d969d29ad7242d673daef8d7999358d8f4eca5

  • SHA256

    9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053

  • SHA512

    03b14aadb90c84a4aa0363e00dbee55b40b8b5bf1efc54228a6db50dd668794951488ae8721e68f43bdb001b3e95dc4b41115bf51a3509907b91d4c0d7318e50

  • SSDEEP

    1536:cn+WqQuctgd8mz1RSOWMrqYrF8CqY6kbBQIGg1e05rx/tssTmzgigOXClG:A+X8YFH3rqYRRqJkAulasacJOCU

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.3:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9c440ce5374b11c0a21cc567d9f68c0594366e286675f23ef535542708bf5053.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\radE542C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\radE542C.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2168
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\radE542C.tmp.exe

      Filesize

      72KB

      MD5

      b6eb8bfee4062a227191308af8bd4bf6

      SHA1

      782435960c00ede2637f60bcf85a77ca4c728791

      SHA256

      3e42d40db43cf43e200377e0778d9f715cf2bbc4414013b4bd020586fb5bb731

      SHA512

      731461d7e853bd5b8b7a13986fe15d92ccf5d07b8b3a03d5c67f0fd03e90f2ada99741598385b0f06b8fc3f005d3026b5ecc647ad4dfce426eb08314cc37a3c3

    • memory/1292-0-0x000000002F6C1000-0x000000002F6C2000-memory.dmp

      Filesize

      4KB

    • memory/1292-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1292-2-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/1292-12-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1292-18-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1292-24-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1292-35-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/1292-36-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

      Filesize

      1024KB

    • memory/2168-34-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB