Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
msf.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msf.docm
Resource
win10v2004-20241007-en
General
-
Target
msf.docm
-
Size
83KB
-
MD5
24fa322381a5fe289d5387282df09cb1
-
SHA1
c3141ff88b31a80cf9d494fa6bf93ec45091d3ca
-
SHA256
9e3c9b918dfd2e9a183c8c3c83ff0af441a4e7085a588afe7a606e9a46d83d9b
-
SHA512
bda58431b60b5ba773e77defee6ebd85c8ac82e1af1015e5581686189e2c3595412d9bc8232f9ea3714246f5098295d52d60085f60e3f70fc64dcb9504d95cca
-
SSDEEP
1536:Mb+WqQuctgdomXh9Qi4SA2/KBHlSL+Bee/2wOlqqsB0sRvziEOXClx:U+X8YF3ISA2/SHlJ2wOlqqsLptOCX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1580 radC9D41.tmp.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1916 1580 WerFault.exe 86 1648 1580 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language radC9D41.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3564 WINWORD.EXE 3564 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3564 WINWORD.EXE 3564 WINWORD.EXE 3564 WINWORD.EXE 3564 WINWORD.EXE 3564 WINWORD.EXE 3564 WINWORD.EXE 3564 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1580 3564 WINWORD.EXE 86 PID 3564 wrote to memory of 1580 3564 WINWORD.EXE 86 PID 3564 wrote to memory of 1580 3564 WINWORD.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\msf.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\radC9D41.tmp.exe"C:\Users\Admin\AppData\Local\Temp\radC9D41.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 12243⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 15123⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1580 -ip 15801⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1580 -ip 15801⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
72KB
MD548d127c788a379f5b4578904ff7e9952
SHA11b7032eee3eecd0b8c7efbfe5f327cdb9cfe12aa
SHA256d34dab00b450fc9bfb193c7e194a66637a379dabb61d59ddd917b3790283e002
SHA5128c813dde3f4461fb7ce15eed4eb9573a9cefb13a1da4345ef4e4578357babf9987d3b26b64c2a48c2f23dd79af36fc1461ee445a5df1d38953e7f1ecd2673aad