Overview
overview
10Static
static
3MsiZap.exe
windows7-x64
3MsiZap.exe
windows10-2004-x64
3adfind.exe
windows7-x64
3adfind.exe
windows10-2004-x64
3croperdate.dll
windows7-x64
3croperdate.dll
windows10-2004-x64
3croperdate.exe
windows7-x64
10croperdate.exe
windows10-2004-x64
10croperdate64.dll
windows7-x64
1croperdate64.dll
windows10-2004-x64
1doc_main_0.docx
windows7-x64
7doc_main_0.docx
windows10-2004-x64
1doc_main_1.docx
windows7-x64
7doc_main_1.docx
windows10-2004-x64
1doc_main_10.docx
windows7-x64
7doc_main_10.docx
windows10-2004-x64
1doc_main_11.docx
windows7-x64
7doc_main_11.docx
windows10-2004-x64
1doc_main_12.docx
windows7-x64
7doc_main_12.docx
windows10-2004-x64
1doc_main_13.docx
windows7-x64
7doc_main_13.docx
windows10-2004-x64
1doc_main_14.docx
windows7-x64
7doc_main_14.docx
windows10-2004-x64
1doc_main_15.docx
windows7-x64
7doc_main_15.docx
windows10-2004-x64
1doc_main_16.docx
windows7-x64
7doc_main_16.docx
windows10-2004-x64
1doc_main_17.docx
windows7-x64
7doc_main_17.docx
windows10-2004-x64
1doc_main_18.docx
windows7-x64
7doc_main_18.docx
windows10-2004-x64
1Analysis
-
max time kernel
124s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
MsiZap.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MsiZap.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adfind.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
adfind.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
croperdate.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
croperdate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
croperdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
croperdate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
croperdate64.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
croperdate64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
doc_main_0.docx
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
doc_main_0.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
doc_main_1.docx
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
doc_main_1.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
doc_main_10.docx
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
doc_main_10.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
doc_main_11.docx
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
doc_main_11.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
doc_main_12.docx
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
doc_main_12.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
doc_main_13.docx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
doc_main_13.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
doc_main_14.docx
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
doc_main_14.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
doc_main_15.docx
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
doc_main_15.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
doc_main_16.docx
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
doc_main_16.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
doc_main_17.docx
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
doc_main_17.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
doc_main_18.docx
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
doc_main_18.docx
Resource
win10v2004-20241007-en
General
-
Target
doc_main_1.docx
-
Size
121KB
-
MD5
0da59de6dd4b145c23f14c4592031515
-
SHA1
933eed6827b6f49a0f9b2c1af1fe838c39e4cfa2
-
SHA256
ff34dd776636f1e13ece8e4ae6ce31e10dbae28e4b8b15c37ff9655ea79a42b9
-
SHA512
490957ee59aa940535113e10caed00456aad37442366796a6eeb6d0d8c9c5e506d83b33ad4059715cec562a21ca58b9656926355305c3ed11c4cac4b9171d434
-
SSDEEP
3072:WeBQAhNHh83WrtH8ynSlP2UUQk+CmLSZtBpFoq7To:PLvB83+cySlVYmLioq7To
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3028 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3028 WINWORD.EXE 3028 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2424 3028 WINWORD.EXE 32 PID 3028 wrote to memory of 2424 3028 WINWORD.EXE 32 PID 3028 wrote to memory of 2424 3028 WINWORD.EXE 32 PID 3028 wrote to memory of 2424 3028 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\doc_main_1.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2EE3622B-8DD7-4932-BCA7-21780FD76198}.FSD
Filesize128KB
MD588154bb48489e8453fe373bb524df98f
SHA14e1db3068acace564ccf172b0484727d0194dd5b
SHA256c24d818d5720ab7970b3bd0e796cbd36754ea6e41d755377fdf38dc94eb2e8a9
SHA512e4b7a2caeb38308a630a6979aaf49598a3faaa4d6118b7b5f43f66f0e13c3a0e8ab7f12f0f9c4b3d66117dc0b8603ebf091bcfa49a76dffa387d64479854322a
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD5f54a99bf8a38b009fa1e528c1fae25bf
SHA134d29f60eb70959198c8ac8ba8d89ba8441bf205
SHA2564544212fe2f015aabd9b6dbe27f153611883701fda964caaa4624ad07d9b468e
SHA512c2e2d6271c10d165b688fc6536a990eff8dd3d3f0c21fb11e073745a9a026eeca933cb8b26ce63c8e483f7775d8dbaad5ced758e8c4617732e01c6fc6da5a323
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD58456c95f591972f33cc3e3dfb026b9ec
SHA17dc6d31643ca2a8098407d606b6181922880e7a4
SHA256c819e512790bae39c2ba0ffddec1abfb1decd619d1044bca08bd49d5158e5141
SHA512bcea639b0006d2acfca8fe543d9a780356dd2e11569823afcbe238b6b99a7a5b00ce30336d47545808b2d0356374b73e71721ddd61e26b707391b85fb4ea9602
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{74D63733-EEFA-483D-B879-EE1B8A1DCA9C}.FSD
Filesize128KB
MD5779c5d35cfb93efe19ea2a7da97d1608
SHA14c515ba0ae50b86a7807908a3123288d9d2c1e14
SHA256e2829d1a7592eaa3af902595f81c490e42a3d5d3aea8c7876bdfb58ba7861451
SHA512034c3e79af73a9ee83774b5bd0b3fac2c1b9cefb35065ca32a0f58696505972d535031314c3a13e59ed4e0ee1250bd3071336346da41671e3014852d0ba1ee1b
-
Filesize
128KB
MD59a13e35fb9841888158a2066ed4615dd
SHA1d969e4bfe1713c0fc5465c974342c736ac3daec3
SHA256e4709bf01fdebbcb720a9cd25a5a93eee06ee1318d755f2ea4696f9c1cb79aa1
SHA5129ca8b19de895fa52cf81039efb0fd765fae99f88526ac67e0d33628b3e54d3d63c32b8bc1c3b62d87f70d9abcc7c2bc66d93e0f7b9623b1760ec8de3bc920ca1