Analysis
-
max time kernel
34s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 17:46
Behavioral task
behavioral1
Sample
0cef17ba672793d8e32216240706cf46e3a2894d0e558906a1782405a8f4decf.docm
Resource
win7-20240903-en
General
-
Target
0cef17ba672793d8e32216240706cf46e3a2894d0e558906a1782405a8f4decf.docm
-
Size
93KB
-
MD5
e745d9bb0dd69f151afea9eadc808711
-
SHA1
8b2b5cfc6ffc976a51059a84e020d9459e870bfd
-
SHA256
0cef17ba672793d8e32216240706cf46e3a2894d0e558906a1782405a8f4decf
-
SHA512
bfcd2c4b25a5331b43d0f858ed24b834bbfc6ca13b00d71b161efeb2dc31f66b52d907145ad6c0d5663e0a3baf7dbdb537ac8865ecbff53d297640a4fc6ba8b9
-
SSDEEP
1536:SwYn0lfu/j5Q0KWn1o6DB+ZbuRqcwoDZc4+bhwTd81tlrJVhfIGgdqVw2X8Qr374:SwY0lo1QG1FDFpZabhwTIXvNjgEW2XxY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2376 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 WINWORD.EXE 2376 WINWORD.EXE 2376 WINWORD.EXE 2376 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2832 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 2832 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 2832 2376 WINWORD.EXE 32 PID 2376 wrote to memory of 2832 2376 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0cef17ba672793d8e32216240706cf46e3a2894d0e558906a1782405a8f4decf.docm"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84