Analysis

  • max time kernel
    137s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 11:21

General

  • Target

    msf.docm

  • Size

    83KB

  • MD5

    24fa322381a5fe289d5387282df09cb1

  • SHA1

    c3141ff88b31a80cf9d494fa6bf93ec45091d3ca

  • SHA256

    9e3c9b918dfd2e9a183c8c3c83ff0af441a4e7085a588afe7a606e9a46d83d9b

  • SHA512

    bda58431b60b5ba773e77defee6ebd85c8ac82e1af1015e5581686189e2c3595412d9bc8232f9ea3714246f5098295d52d60085f60e3f70fc64dcb9504d95cca

  • SSDEEP

    1536:Mb+WqQuctgdomXh9Qi4SA2/KBHlSL+Bee/2wOlqqsB0sRvziEOXClx:U+X8YF3ISA2/SHlJ2wOlqqsLptOCX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\msf.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 1340
        3⤵
        • Program crash
        PID:2044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 1524
        3⤵
        • Program crash
        PID:4568
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4136 -ip 4136
    1⤵
      PID:4824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4136 -ip 4136
      1⤵
        PID:3012
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1148
        • C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"
          1⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5016
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1516
            2⤵
            • Program crash
            PID:2252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1524
            2⤵
            • Program crash
            PID:5004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5016 -ip 5016
          1⤵
            PID:4832
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5016 -ip 5016
            1⤵
              PID:3004
            • C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"
              1⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1196
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 1488
                2⤵
                • Program crash
                PID:3928
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 1496
                2⤵
                • Program crash
                PID:3220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1196 -ip 1196
              1⤵
                PID:2900
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1196 -ip 1196
                1⤵
                  PID:2132
                • C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe
                  "C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe"
                  1⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  PID:4548
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 1476
                    2⤵
                    • Program crash
                    PID:1964
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 1484
                    2⤵
                    • Program crash
                    PID:4920
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4548 -ip 4548
                  1⤵
                    PID:2056
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4548 -ip 4548
                    1⤵
                      PID:3552

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\TCD3BFF.tmp\gb.xsl

                      Filesize

                      262KB

                      MD5

                      51d32ee5bc7ab811041f799652d26e04

                      SHA1

                      412193006aa3ef19e0a57e16acf86b830993024a

                      SHA256

                      6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

                      SHA512

                      5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

                    • C:\Users\Admin\AppData\Local\Temp\rad7F66B.tmp.exe

                      Filesize

                      72KB

                      MD5

                      48d127c788a379f5b4578904ff7e9952

                      SHA1

                      1b7032eee3eecd0b8c7efbfe5f327cdb9cfe12aa

                      SHA256

                      d34dab00b450fc9bfb193c7e194a66637a379dabb61d59ddd917b3790283e002

                      SHA512

                      8c813dde3f4461fb7ce15eed4eb9573a9cefb13a1da4345ef4e4578357babf9987d3b26b64c2a48c2f23dd79af36fc1461ee445a5df1d38953e7f1ecd2673aad

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                      Filesize

                      5KB

                      MD5

                      22bdb319722d30842d314b02ba6fa6b3

                      SHA1

                      0b22454e8d739acc4fb62894494ec44243301136

                      SHA256

                      34f7273a89584e34a882d7e33e45cd820a5923a33cc5448c757bb29ddc1cff9a

                      SHA512

                      3a102f3b3d6e0d614c57b9acada6f9e2124700b6e5603694bccb723e56b8ee35f83c556e519a7f86e92c465e04ef33c9ef58ec5db9c5817b3867614ac5a473b6

                    • memory/1224-16-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-18-0x00007FFB01340000-0x00007FFB01350000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-6-0x00007FFB03C50000-0x00007FFB03C60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-7-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-8-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-9-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-4-0x00007FFB03C50000-0x00007FFB03C60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-12-0x00007FFB01340000-0x00007FFB01350000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-11-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-13-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-10-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-14-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-17-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-21-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-20-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-19-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-44-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-0-0x00007FFB43C6D000-0x00007FFB43C6E000-memory.dmp

                      Filesize

                      4KB

                    • memory/1224-5-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-15-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-46-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-43-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-36-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-45-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-56-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-2-0x00007FFB03C50000-0x00007FFB03C60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-1-0x00007FFB03C50000-0x00007FFB03C60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-67-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-66-0x00007FFB43C6D000-0x00007FFB43C6E000-memory.dmp

                      Filesize

                      4KB

                    • memory/1224-83-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-69-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-70-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-71-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-72-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-73-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1224-3-0x00007FFB03C50000-0x00007FFB03C60000-memory.dmp

                      Filesize

                      64KB

                    • memory/1224-82-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/4136-68-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/4136-65-0x00007FFB43BD0000-0x00007FFB43DC5000-memory.dmp

                      Filesize

                      2.0MB