Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 12:50

General

  • Target

    Pago.doc

  • Size

    48KB

  • MD5

    d0ada04c1b8cfc4c6a0618d5d6c9a346

  • SHA1

    cb8450af21d627d9e21d7d60331ea63abe1616f1

  • SHA256

    29721d2110ed64d24ab30e34bd736c56a39fd0427a2f3099fcacbc2d6a5167e9

  • SHA512

    fc07a61d3c1be9e3dc76d9e28ab140b6b0751deec465897eb6c6ca66977421d902cbd1a3dd411f3b2b466d9bccfc8bed5e42ea1a5369a5bf5843a38a540ff22f

  • SSDEEP

    384:iNkHfFAhRp/6j1dhUsQGlWmxDJzkpiSY5UAQ3krEdW2sUXQ9Aaqti/Bp60jc:NKhHi3KnCWmHzk7XkrEZwFE

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Pago.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        3⤵
        • Executes dropped EXE
        PID:4756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 88
          4⤵
          • Program crash
          PID:1276
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        3⤵
        • Executes dropped EXE
        PID:1880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 80
          4⤵
          • Program crash
          PID:3632
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe
        3⤵
        • Executes dropped EXE
        PID:4308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 80
          4⤵
          • Program crash
          PID:3832
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4756 -ip 4756
    1⤵
      PID:1524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1880 -ip 1880
      1⤵
        PID:1396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4308 -ip 4308
        1⤵
          PID:4844

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCD491E.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          16B

          MD5

          d29962abc88624befc0135579ae485ec

          SHA1

          e40a6458296ec6a2427bcb280572d023a9862b31

          SHA256

          a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

          SHA512

          4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\TRJPC.exe

          Filesize

          305KB

          MD5

          6cc0abc5f4e343708dc4ad0073784da3

          SHA1

          a2c0274575fb089bb76f34bf0b52e9f84f0c0a3a

          SHA256

          c049ffcacd139b734c807013fefa36e6730077930d3736f342aaddc3fe144497

          SHA512

          61703c2283b321f30d47e6e2319d8372abd3d6eb980a27ca08d70946b7053f904d2adbc8c71ea3e36c8e6a29d110939f71289e437d936db757a53819576ca310

        • memory/1480-135-0x0000000002B10000-0x0000000002B16000-memory.dmp

          Filesize

          24KB

        • memory/1480-134-0x00000000052D0000-0x0000000005362000-memory.dmp

          Filesize

          584KB

        • memory/1480-133-0x0000000009CA0000-0x000000000A244000-memory.dmp

          Filesize

          5.6MB

        • memory/1480-132-0x0000000009650000-0x00000000096EC000-memory.dmp

          Filesize

          624KB

        • memory/1480-131-0x0000000002A10000-0x0000000002A6C000-memory.dmp

          Filesize

          368KB

        • memory/1480-130-0x0000000002AB0000-0x0000000002AB6000-memory.dmp

          Filesize

          24KB

        • memory/1480-129-0x0000000000810000-0x0000000000862000-memory.dmp

          Filesize

          328KB

        • memory/1480-128-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-9-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-11-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-13-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-14-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-15-0x00007FF7EACA0000-0x00007FF7EACB0000-memory.dmp

          Filesize

          64KB

        • memory/1724-70-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-106-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-8-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-126-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-125-0x00007FF82D42D000-0x00007FF82D42E000-memory.dmp

          Filesize

          4KB

        • memory/1724-127-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-12-0x00007FF7EACA0000-0x00007FF7EACB0000-memory.dmp

          Filesize

          64KB

        • memory/1724-10-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-1-0x00007FF82D42D000-0x00007FF82D42E000-memory.dmp

          Filesize

          4KB

        • memory/1724-7-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-6-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-2-0x00007FF7ED410000-0x00007FF7ED420000-memory.dmp

          Filesize

          64KB

        • memory/1724-4-0x00007FF7ED410000-0x00007FF7ED420000-memory.dmp

          Filesize

          64KB

        • memory/1724-3-0x00007FF7ED410000-0x00007FF7ED420000-memory.dmp

          Filesize

          64KB

        • memory/1724-5-0x00007FF7ED410000-0x00007FF7ED420000-memory.dmp

          Filesize

          64KB

        • memory/1724-145-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-154-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

          Filesize

          2.0MB

        • memory/1724-0-0x00007FF7ED410000-0x00007FF7ED420000-memory.dmp

          Filesize

          64KB