Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 16:11
Behavioral task
behavioral1
Sample
krpt.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
krpt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wps.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
wps.exe
Resource
win10v2004-20241007-en
General
-
Target
wps.exe
-
Size
1.0MB
-
MD5
8258fb211075d889b4e3e15458b2a9c5
-
SHA1
6620a898c2899b346ee6a524b09c306775e44706
-
SHA256
b814a4c506ce2dd3920990ecfcb106b7650529be39fe7513373073c5274e62b3
-
SHA512
603cef3ad12ccf092b4cf49315da79f1893775d188c6c7d0015932f9e0ad9030d7871475b7dd202dad0a2198ecde654b73dd819175d2a61c8a64bf32de7693f2
-
SSDEEP
24576:P7QXeEKjLIRwIp8wciIJZou3aF8Sj+1vDXjU/5:jQuEoIG28wcmF8Sj+B/K5
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2312 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2312 WINWORD.EXE 2312 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2312 2524 wps.exe 29 PID 2524 wrote to memory of 2312 2524 wps.exe 29 PID 2524 wrote to memory of 2312 2524 wps.exe 29 PID 2524 wrote to memory of 2312 2524 wps.exe 29 PID 2312 wrote to memory of 2696 2312 WINWORD.EXE 30 PID 2312 wrote to memory of 2696 2312 WINWORD.EXE 30 PID 2312 wrote to memory of 2696 2312 WINWORD.EXE 30 PID 2312 wrote to memory of 2696 2312 WINWORD.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\wps.exe"C:\Users\Admin\AppData\Local\Temp\wps.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\冠状病毒实时更新:中国正在追踪来自湖北的旅行者.doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5c5b98b77810c5619d20b71791b820529
SHA10c9bcc7e92c9557d4f2072e40af0e5e029d92c15
SHA256fb82f32b9ce1d63cc86ab6ee93b9e619056222af181578d2f8ed38ee6474c092
SHA512e6f16c71d3aefff8789c28b1a8abbcb47680dbdced912f50d318a9037c6f56bfe0a48e5cbf879ef24cecff03a5af937f8ec4b25c8230229730f71c38453da2b4