Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 02:11
Behavioral task
behavioral1
Sample
1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df.doc
Resource
win10v2004-20241007-en
General
-
Target
1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df.doc
-
Size
31KB
-
MD5
6fbadff0dfea598344dfd745651519a5
-
SHA1
2876693e03de35a36122f54721245f3a1ec89904
-
SHA256
1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df
-
SHA512
f9db25da78ab1d6e6e3eda01e4dfc101c52ed41e8c0cde5592ee5b25d3b430b8846ec46f153d57f88c0e457ea216ff58578d69303e705ffa330e724484df9abd
-
SSDEEP
192:1wlLZEvAzi6/6rnsqpZtgmavAcEdRwYswXGrSWh8dA0jC7ccLOtYqzfp0Aa:GFiiSsqdg1vA9L150SWmdA0jocftYA
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2932 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 WINWORD.EXE 2932 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2656 2932 WINWORD.EXE 29 PID 2932 wrote to memory of 2656 2932 WINWORD.EXE 29 PID 2932 wrote to memory of 2656 2932 WINWORD.EXE 29 PID 2932 wrote to memory of 2656 2932 WINWORD.EXE 29
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1d978375afa9fca1578a179478e5d0527e36bf8f9318d7cdc161f7b25c55c8df.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2656
-