Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
msf.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msf.docm
Resource
win10v2004-20241007-en
General
-
Target
msf.docm
-
Size
83KB
-
MD5
24fa322381a5fe289d5387282df09cb1
-
SHA1
c3141ff88b31a80cf9d494fa6bf93ec45091d3ca
-
SHA256
9e3c9b918dfd2e9a183c8c3c83ff0af441a4e7085a588afe7a606e9a46d83d9b
-
SHA512
bda58431b60b5ba773e77defee6ebd85c8ac82e1af1015e5581686189e2c3595412d9bc8232f9ea3714246f5098295d52d60085f60e3f70fc64dcb9504d95cca
-
SSDEEP
1536:Mb+WqQuctgdomXh9Qi4SA2/KBHlSL+Bee/2wOlqqsB0sRvziEOXClx:U+X8YF3ISA2/SHlJ2wOlqqsLptOCX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4136 rad7F66B.tmp.exe 5016 rad7F66B.tmp.exe 1196 rad7F66B.tmp.exe 4548 rad7F66B.tmp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rund11.exe rad7F66B.tmp.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 2044 4136 WerFault.exe 87 4568 4136 WerFault.exe 87 2252 5016 WerFault.exe 119 5004 5016 WerFault.exe 119 3928 1196 WerFault.exe 126 3220 1196 WerFault.exe 126 1964 4548 WerFault.exe 133 4920 4548 WerFault.exe 133 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rad7F66B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rad7F66B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rad7F66B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rad7F66B.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1224 WINWORD.EXE 1224 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE 1224 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4136 1224 WINWORD.EXE 87 PID 1224 wrote to memory of 4136 1224 WINWORD.EXE 87 PID 1224 wrote to memory of 4136 1224 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\msf.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13403⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 15243⤵
- Program crash
PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4136 -ip 41361⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4136 -ip 41361⤵PID:3012
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 15162⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 15242⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5016 -ip 50161⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5016 -ip 50161⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 14882⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 14962⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1196 -ip 11961⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1196 -ip 11961⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 14762⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 14842⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4548 -ip 45481⤵PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4548 -ip 45481⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
72KB
MD548d127c788a379f5b4578904ff7e9952
SHA11b7032eee3eecd0b8c7efbfe5f327cdb9cfe12aa
SHA256d34dab00b450fc9bfb193c7e194a66637a379dabb61d59ddd917b3790283e002
SHA5128c813dde3f4461fb7ce15eed4eb9573a9cefb13a1da4345ef4e4578357babf9987d3b26b64c2a48c2f23dd79af36fc1461ee445a5df1d38953e7f1ecd2673aad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize5KB
MD522bdb319722d30842d314b02ba6fa6b3
SHA10b22454e8d739acc4fb62894494ec44243301136
SHA25634f7273a89584e34a882d7e33e45cd820a5923a33cc5448c757bb29ddc1cff9a
SHA5123a102f3b3d6e0d614c57b9acada6f9e2124700b6e5603694bccb723e56b8ee35f83c556e519a7f86e92c465e04ef33c9ef58ec5db9c5817b3867614ac5a473b6