Resubmissions

11-02-2025 00:12

250211-ahcqdasrbz 10

08-02-2025 06:10

250208-gw53ea1mhp 10

Analysis

  • max time kernel
    65s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2025 06:10

Errors

Reason
Machine shutdown

General

  • Target

    08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll

  • Size

    144KB

  • MD5

    9e9bb42a965b89a9dce86c8b36b24799

  • SHA1

    e2d1161ac7fa3420648ba59f7a5315ed0acb04c2

  • SHA256

    08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d

  • SHA512

    e5ba20e364c96260c821bc61eab51906e2075aa0d3755ef25aabfc8f6f9545452930be42d978d96e3a68e2b92120df4940b276c9872ebf36fa50913523c51ce8

  • SSDEEP

    3072:ep1qwbk6Wbh/UR++pz1OBrNtZtHpspurmxwPtnneZY:epoP6WV/C116rNbtHpsYrmSP1neZY

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1920
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\UnpublishJoin.docm"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2768
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2496
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x508
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3016
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2056

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        19KB

        MD5

        0b2cfe22522eae0c70b4476f64e69239

        SHA1

        7b12b825ad7f4f849b435db0c577f12e86ad4304

        SHA256

        ed54abe9b42ecc87575d46cca67fa21ba8c5f2055ea96acf8ab97b3441fa525b

        SHA512

        17522934c8535439686badfa8667f6ad3b9822260a3549cdeb289c3f8723423ce77ecb1eb78db0f207b31b2d33ced68a19350190cc462644d12e0ebceba25b7c

      • memory/2768-0-0x000000002FEB1000-0x000000002FEB2000-memory.dmp

        Filesize

        4KB

      • memory/2768-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2768-2-0x0000000073C0D000-0x0000000073C18000-memory.dmp

        Filesize

        44KB

      • memory/2768-7-0x0000000073C0D000-0x0000000073C18000-memory.dmp

        Filesize

        44KB

      • memory/2768-20-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2768-21-0x0000000073C0D000-0x0000000073C18000-memory.dmp

        Filesize

        44KB