Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 04:18

General

  • Target

    59657f4537018aa3621450282e9a973895e33e6f236f4f644769a505c498c004.docm

  • Size

    83KB

  • MD5

    e9e6f32925c8fb28a3834e4a4575d566

  • SHA1

    7b220d821d5cc32cf8a9fa105985b1bb550029b5

  • SHA256

    59657f4537018aa3621450282e9a973895e33e6f236f4f644769a505c498c004

  • SHA512

    acbbb209b5b94781dd9600a7c20476d0b39d5bbb9fb1806aee68f2264d8725f03fc9427683db88862d3d7d81bd53fa47f88f4be579b66a966fcc0ea6f618db20

  • SSDEEP

    1536:+o+WqQuctgdRm+yapjClC3H5wCVG3OrH65/7VUs0ngCjuYbgGvtioOXClI:R+X8YfHtC2HV4O7eTv0ngCjuBGvtFOC2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\59657f4537018aa3621450282e9a973895e33e6f236f4f644769a505c498c004.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\rad80950.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\rad80950.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD4A.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\rad80950.tmp.exe

    Filesize

    72KB

    MD5

    12a13fd7bcbcadbd0e2a50c54e20fddc

    SHA1

    0f58a27f38b531008f3e50334e5d831d4cdb674f

    SHA256

    ad3221505c9366ba7d9b9a0fd951ff91fd2be34651400afb50562d9ec3b264ee

    SHA512

    8513e5d49167eccbe91f690d92b1031e938187bd6e643af65eea35dcfb4b97252d453bcfe7caaa5e6e57cc904721592859206049edd3082ce0026b40b3cc0d4e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    88c587487fb9eac428c0f3a2019e69d7

    SHA1

    1e3dba2a1f197108bd36f2611691e138156e41bd

    SHA256

    3f7c03361bc32963cd0717ba4e18c9bce672abb1755b31eeb126ad6089589f17

    SHA512

    8e00dc814c27dc00dbdd1f23dd7437366a389d0c780ed848e8fad25fe8022667740ffb45371e4458e1f84c25acb7105b182c907e64f1c147136adf391a55e821

  • memory/2540-15-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-78-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-9-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-38-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-7-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-12-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-13-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-11-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-10-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-6-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-5-0x00007FFC0C470000-0x00007FFC0C480000-memory.dmp

    Filesize

    64KB

  • memory/2540-14-0x00007FFC0A200000-0x00007FFC0A210000-memory.dmp

    Filesize

    64KB

  • memory/2540-17-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-20-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-19-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-18-0x00007FFC0A200000-0x00007FFC0A210000-memory.dmp

    Filesize

    64KB

  • memory/2540-16-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-4-0x00007FFC0C470000-0x00007FFC0C480000-memory.dmp

    Filesize

    64KB

  • memory/2540-8-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-0-0x00007FFC4C48D000-0x00007FFC4C48E000-memory.dmp

    Filesize

    4KB

  • memory/2540-33-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-36-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-39-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-40-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-43-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-1-0x00007FFC0C470000-0x00007FFC0C480000-memory.dmp

    Filesize

    64KB

  • memory/2540-3-0x00007FFC0C470000-0x00007FFC0C480000-memory.dmp

    Filesize

    64KB

  • memory/2540-63-0x00007FFC4C48D000-0x00007FFC4C48E000-memory.dmp

    Filesize

    4KB

  • memory/2540-64-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-65-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-69-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-70-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-71-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-72-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2540-2-0x00007FFC0C470000-0x00007FFC0C480000-memory.dmp

    Filesize

    64KB

  • memory/2540-37-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3368-56-0x00007FFC4C3F0000-0x00007FFC4C5E5000-memory.dmp

    Filesize

    2.0MB