Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 11:25

General

  • Target

    msf.docm

  • Size

    83KB

  • MD5

    24fa322381a5fe289d5387282df09cb1

  • SHA1

    c3141ff88b31a80cf9d494fa6bf93ec45091d3ca

  • SHA256

    9e3c9b918dfd2e9a183c8c3c83ff0af441a4e7085a588afe7a606e9a46d83d9b

  • SHA512

    bda58431b60b5ba773e77defee6ebd85c8ac82e1af1015e5581686189e2c3595412d9bc8232f9ea3714246f5098295d52d60085f60e3f70fc64dcb9504d95cca

  • SSDEEP

    1536:Mb+WqQuctgdomXh9Qi4SA2/KBHlSL+Bee/2wOlqqsB0sRvziEOXClx:U+X8YF3ISA2/SHlJ2wOlqqsLptOCX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\msf.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Users\Admin\AppData\Local\Temp\radC9D41.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\radC9D41.tmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 1224
        3⤵
        • Program crash
        PID:1916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 1512
        3⤵
        • Program crash
        PID:1648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1580 -ip 1580
    1⤵
      PID:1384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1580 -ip 1580
      1⤵
        PID:2416

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\TCDD802.tmp\gb.xsl

        Filesize

        262KB

        MD5

        51d32ee5bc7ab811041f799652d26e04

        SHA1

        412193006aa3ef19e0a57e16acf86b830993024a

        SHA256

        6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

        SHA512

        5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

      • C:\Users\Admin\AppData\Local\Temp\radC9D41.tmp.exe

        Filesize

        72KB

        MD5

        48d127c788a379f5b4578904ff7e9952

        SHA1

        1b7032eee3eecd0b8c7efbfe5f327cdb9cfe12aa

        SHA256

        d34dab00b450fc9bfb193c7e194a66637a379dabb61d59ddd917b3790283e002

        SHA512

        8c813dde3f4461fb7ce15eed4eb9573a9cefb13a1da4345ef4e4578357babf9987d3b26b64c2a48c2f23dd79af36fc1461ee445a5df1d38953e7f1ecd2673aad

      • memory/1580-65-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/1580-57-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-36-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-30-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-7-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-11-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-10-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-12-0x00007FF803AF0000-0x00007FF803B00000-memory.dmp

        Filesize

        64KB

      • memory/3564-9-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-8-0x00007FF806450000-0x00007FF806460000-memory.dmp

        Filesize

        64KB

      • memory/3564-14-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-13-0x00007FF803AF0000-0x00007FF803B00000-memory.dmp

        Filesize

        64KB

      • memory/3564-5-0x00007FF806450000-0x00007FF806460000-memory.dmp

        Filesize

        64KB

      • memory/3564-37-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-1-0x00007FF84646D000-0x00007FF84646E000-memory.dmp

        Filesize

        4KB

      • memory/3564-4-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-38-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-40-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-6-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-0-0x00007FF806450000-0x00007FF806460000-memory.dmp

        Filesize

        64KB

      • memory/3564-64-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-2-0x00007FF806450000-0x00007FF806460000-memory.dmp

        Filesize

        64KB

      • memory/3564-66-0x00007FF84646D000-0x00007FF84646E000-memory.dmp

        Filesize

        4KB

      • memory/3564-67-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-68-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-69-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-70-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-71-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-77-0x00007FF8463D0000-0x00007FF8465C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3564-3-0x00007FF806450000-0x00007FF806460000-memory.dmp

        Filesize

        64KB