Overview
overview
10Static
static
3MsiZap.exe
windows7-x64
3MsiZap.exe
windows10-2004-x64
3adfind.exe
windows7-x64
3adfind.exe
windows10-2004-x64
3croperdate.dll
windows7-x64
3croperdate.dll
windows10-2004-x64
3croperdate.exe
windows7-x64
10croperdate.exe
windows10-2004-x64
10croperdate64.dll
windows7-x64
1croperdate64.dll
windows10-2004-x64
1doc_main_0.docx
windows7-x64
7doc_main_0.docx
windows10-2004-x64
1doc_main_1.docx
windows7-x64
7doc_main_1.docx
windows10-2004-x64
1doc_main_10.docx
windows7-x64
7doc_main_10.docx
windows10-2004-x64
1doc_main_11.docx
windows7-x64
7doc_main_11.docx
windows10-2004-x64
1doc_main_12.docx
windows7-x64
7doc_main_12.docx
windows10-2004-x64
1doc_main_13.docx
windows7-x64
7doc_main_13.docx
windows10-2004-x64
1doc_main_14.docx
windows7-x64
7doc_main_14.docx
windows10-2004-x64
1doc_main_15.docx
windows7-x64
7doc_main_15.docx
windows10-2004-x64
1doc_main_16.docx
windows7-x64
7doc_main_16.docx
windows10-2004-x64
1doc_main_17.docx
windows7-x64
7doc_main_17.docx
windows10-2004-x64
1doc_main_18.docx
windows7-x64
7doc_main_18.docx
windows10-2004-x64
1Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
MsiZap.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MsiZap.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
adfind.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
adfind.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
croperdate.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
croperdate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
croperdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
croperdate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
croperdate64.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
croperdate64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
doc_main_0.docx
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
doc_main_0.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
doc_main_1.docx
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
doc_main_1.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
doc_main_10.docx
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
doc_main_10.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
doc_main_11.docx
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
doc_main_11.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
doc_main_12.docx
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
doc_main_12.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
doc_main_13.docx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
doc_main_13.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
doc_main_14.docx
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
doc_main_14.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
doc_main_15.docx
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
doc_main_15.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
doc_main_16.docx
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
doc_main_16.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
doc_main_17.docx
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
doc_main_17.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
doc_main_18.docx
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
doc_main_18.docx
Resource
win10v2004-20241007-en
General
-
Target
doc_main_11.docx
-
Size
107KB
-
MD5
282cfbf72c087eeee07d50f1d753f81b
-
SHA1
29713ca07c8d665a6174195194e8f0addb2c7868
-
SHA256
f604a6d503515a6adb91cf5c8fb21bd5f4044326717730ee63c25366dbfee3eb
-
SHA512
20bf47b33b99ba68c3982b3033da87bcaab4108ec679e8cb60e749d60d57543fbf2a29a514771c85fe80fe06f1cc6b81002acf4c48b2a3e17b72755febd08d88
-
SSDEEP
3072:WeBQAhNHh83WrtH8ynSlP2UUQk+CmLSZRp2:PLvB83+cySlVYmLv
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1016 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1016 WINWORD.EXE 1016 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1356 1016 WINWORD.EXE 33 PID 1016 wrote to memory of 1356 1016 WINWORD.EXE 33 PID 1016 wrote to memory of 1356 1016 WINWORD.EXE 33 PID 1016 wrote to memory of 1356 1016 WINWORD.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\doc_main_11.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{171E6709-CF4C-4007-9248-5992D19FA56E}.FSD
Filesize128KB
MD5c98e480e28ae5e6bbd9cf0914f9329a7
SHA1669b400cdeb8c50b8c296ef50f9c3e9bea0d2cda
SHA256a240473ae36f5895a1971fd52dc74e52114b23ffea7170d528bc471139f5ea35
SHA5122b3f768deedebb1bebaf95b0c24640ad298e3a0ff80ac75ef331167755631729f073320c5f84c4bb17448941f95f7cb2956ed72354b8c483651054f793db56f7
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD5039554c5c6bdd6f097848a4288351d07
SHA1d3f010597d23406bda2e111b92e9cb1098818fbb
SHA256a02d60cc72f07a7bfae202fcd7ead4c84073d832e1b877921523fcaf14df48d3
SHA5129b9d0c0475eaec2f8cd371630b3b782a1ebcc532b032530c845449b959fba7ca9eb554d070e902b8e2c661e5dabdccc0e445ccff78a67bb0c7b018599c7d5d5e
-
Filesize
128KB
MD5e49712d2a7a667ef14da732a9a067dd7
SHA1fbada32a0adadc10d8c6142c1c5d1bb7ce32f591
SHA25664a4bcbef547228c8d865fb2b99cba689eec97d1a518ccc03ece27beff9a4311
SHA512194e553e107cbfd99dcf712da218aaefc9f771e954c7d27f864fa6de93d6a11ba5b6bd6019152787c5988c9f6fbdf0cda67a16cb550253bbbeff8797a6a85e86