Resubmissions

06-04-2022 09:29

220406-lf2ghacag7 10

06-04-2022 09:26

220406-lee7wafbfq 10

Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    06-04-2022 09:29

General

  • Target

    e88795f5be1970400521e0041c4603c62ff681f24ac75f926d524d092eecb6ee.bin.exe

  • Size

    2.9MB

  • MD5

    9b4286a3888680d958ba3a9d964ef04c

  • SHA1

    e4a2aaba0259d7feebc6b426b1df8cc43fe35b3a

  • SHA256

    e88795f5be1970400521e0041c4603c62ff681f24ac75f926d524d092eecb6ee

  • SHA512

    abf7490bb394cf0246b5feadffedd03a55bd5bf2e90d5385282b6a4e0e2e9d9d5932f305e334737fbe83514dbc1ab20a9b34b0a62c50933a7a771e0b716a8e2e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88795f5be1970400521e0041c4603c62ff681f24ac75f926d524d092eecb6ee.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\e88795f5be1970400521e0041c4603c62ff681f24ac75f926d524d092eecb6ee.bin.exe"
    1⤵
      PID:1052
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ShowSwitch.doc"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1052-54-0x0000000075F71000-0x0000000075F73000-memory.dmp

      Filesize

      8KB

    • memory/2044-55-0x0000000072941000-0x0000000072944000-memory.dmp

      Filesize

      12KB

    • memory/2044-56-0x00000000703C1000-0x00000000703C3000-memory.dmp

      Filesize

      8KB

    • memory/2044-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2044-59-0x00000000713AD000-0x00000000713B8000-memory.dmp

      Filesize

      44KB

    • memory/2044-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB