Overview
overview
10Static
static
10malware-sa...er.jpg
windows7-x64
3malware-sa...er.jpg
windows10-2004-x64
4malware-sa...6.docx
windows7-x64
7malware-sa...6.docx
windows10-2004-x64
1malware-sa...it.ps1
windows7-x64
10malware-sa...it.ps1
windows10-2004-x64
3malware-sa...ad.dll
windows7-x64
3malware-sa...ad.dll
windows10-2004-x64
3malware-sa...re.ps1
windows7-x64
10malware-sa...re.ps1
windows10-2004-x64
10malware-sa...7f.doc
windows7-x64
10malware-sa...7f.doc
windows10-2004-x64
10malware-sa...7f.vbs
windows7-x64
1malware-sa...7f.vbs
windows10-2004-x64
1malware-sa...fb9.js
windows7-x64
8malware-sa...fb9.js
windows10-2004-x64
8malware-sa...b72.js
windows7-x64
8malware-sa...b72.js
windows10-2004-x64
8malware-sa...8ca.js
windows7-x64
8malware-sa...8ca.js
windows10-2004-x64
8malware-sa...bf0.js
windows7-x64
8malware-sa...bf0.js
windows10-2004-x64
8malware-sa...a6e.js
windows7-x64
8malware-sa...a6e.js
windows10-2004-x64
8malware-sa...b41.js
windows7-x64
8malware-sa...b41.js
windows10-2004-x64
8malware-sa...8dd.js
windows7-x64
8malware-sa...8dd.js
windows10-2004-x64
8malware-sa...621.js
windows7-x64
8malware-sa...621.js
windows10-2004-x64
8malware-sa...982.js
windows7-x64
8malware-sa...982.js
windows10-2004-x64
8Analysis
-
max time kernel
125s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 20:39
Behavioral task
behavioral1
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win10v2004-20250217-en
General
-
Target
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
-
Size
142KB
-
MD5
df55633ede8a7905083f6397513a4af2
-
SHA1
0e45b003bf33dc49037e0840a74f2221a10f625e
-
SHA256
d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6
-
SHA512
ef6a6110429db763921139ff853c3cb156152e61afa203b8c80d14816fd8a90f5a5f3edc3422875590538763f617179a616e7693a5c93e12a41ef6bbe3e49bd2
-
SSDEEP
3072:XnTQ/2Ml3BNjuz5ri6+Em0GncPoKSDJ4nVF6G:XTQ/24BNjwriFyPo2L
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Office\Common\Offline\Files\http://job.softline.top/banner.jpg WINWORD.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2000 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2000 WINWORD.EXE 2000 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2228 2000 WINWORD.EXE 33 PID 2000 wrote to memory of 2228 2000 WINWORD.EXE 33 PID 2000 wrote to memory of 2228 2000 WINWORD.EXE 33 PID 2000 wrote to memory of 2228 2000 WINWORD.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\malware-samples-master\2018-04-Common-Malware-Carrier\d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx"1⤵
- Abuses OpenXML format to download file from external location
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E90560BF-8510-4E0F-86FF-5ECE1BB2CB8F}.FSD
Filesize128KB
MD519b1fba3e2505065e7e6b6f5c58e474f
SHA1f28731d890fc0ab4b473e9868f914d3f8ff0d743
SHA2560b8bfc858062cd82dec9ece1d3eea454a786db0a7ce1cc8f16cc88309b7484dc
SHA5120bddb8aab8d3fe6bdb01c795381abba02d7994e3dd438d5e5f03c8266db47cb98dd7831e0f010d94bca4325a451b4680284ec4e8408d273de3fa28ad940e92fc
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{4536298A-FFF9-4651-AB5F-3CE82F2E68D4}.FSD
Filesize128KB
MD50bf8108d48db952aa7b15e23fb099364
SHA1d36152fb9a4fee3c8dbe255d599cd33843820acb
SHA256bea9a1bf653a252cf8dd013e683dc2f42885d8d8cff42ff12ebd6b773a37cc57
SHA51281cce5502db088f7cbd27b86f431aaf14fa5dc61663a36628c69cb9e504392e0c18b194dbe3a0106d06930a0d3d0a9c194cef64a2a3a83f30795c2aad7a5aeed
-
Filesize
128KB
MD5793105d41c8fcfbe62f42041a893332d
SHA1e0c6f548fdb009676968f0d8b25efe01a3965bc7
SHA256e193e45993ad8119f0e408600fc03efbd2564a58e1315129752cc60088505365
SHA512b6ee08e3b51ee700671799dff9d07f655e649e03172062f8725d72e9bb4a09759d3eb458f84a8273da81ca6753fba4401d3baec826de719b55643d6a85de6fd3