Analysis

  • max time kernel
    94s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 21:57

General

  • Target

    e335af83d768498505957df217a1c46c1a0ee6cbdf884d7a11166831dbd5e825.rtf

  • Size

    371KB

  • MD5

    ad0ef249b1524f4293e6c76a9d2ac10d

  • SHA1

    9c85cb7855e7d6aba679551da109d12833d9f06d

  • SHA256

    e335af83d768498505957df217a1c46c1a0ee6cbdf884d7a11166831dbd5e825

  • SHA512

    94ee5621fdf019d419c6b936cb65afdbf8639c9df573c0e4d5465a8bcd2a86e843ec77271c4e145b26e5f9a82b937a81b337cbffc59c3540ba4f83d9ce7fa6b7

  • SSDEEP

    6144:1YabHXFKU9/aFh4EBEpxNQQgt7B4rFLnwPDreksv50mir3:aIX1NG3EpxNQ3SBLnwWkUIz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e335af83d768498505957df217a1c46c1a0ee6cbdf884d7a11166831dbd5e825.rtf"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\193D.tmp
        C:\Users\Admin\AppData\Local\Temp\193D.tmp
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Local\Temp\193D.tmp
          "C:\Users\Admin\AppData\Local\Temp\193D.tmp"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:688
      • C:\Program Files (x86)\Microsoft Office\Office14\winword.exe
        winword C:\Users\Admin\AppData\Local\Temp\cv.doc
        2⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1856
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1192
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1192 -s 3048
          2⤵
          • Program crash
          PID:1648

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • C:\Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • C:\Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • C:\Users\Admin\AppData\Local\Temp\cv.doc

        Filesize

        30KB

        MD5

        14b0bc97f9de5ecca1b75985750eeaa9

        SHA1

        3905da62eac43b926b3483ab8556593aaea3e6f5

        SHA256

        da1982f3cf68a49dd1785dad24f1eb571c7d8b618b42f42dd9c199386e33c966

        SHA512

        7afbefd433baf65790430c49af0ad12db5d727920d403eb80daec65cc1e46e777e9336ad080a9508a670d8dc7d9ab59e402ab6272564bd9f8caff1de2d6903c2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl

        Filesize

        36KB

        MD5

        cd3abd2793280e5b9fa898b60b04264a

        SHA1

        4a71208ce88b60b2fbb70ea5f1069f7327b1523c

        SHA256

        3603adf23348be94221f087359de5342b1a207d4cc051f6ec8d415adf0fffee9

        SHA512

        61903a109476e2a9e47fcdabebb26cefb4cead3c2514fece8d0b31b2b47419365add7e3eeaafa5ce61fb5e76fd8ecb5862514f78957857e1eb23ae252154e91b

      • \Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • \Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • \Users\Admin\AppData\Local\Temp\193D.tmp

        Filesize

        167KB

        MD5

        62e25cc76291a3f348324172ff306ba0

        SHA1

        62d644ac17ac321ee4ade014099390135e49e2e6

        SHA256

        83f4b9560085c1f8eee3c43235c74c9152289ffe8cae141f80f1fba9e26d8281

        SHA512

        c8888425af8431d642b34573417b112013e539aec4def61070164c99773ebf8b202a52ce69e31036fbdf1af54fbcdf58d811061e6df7ae66ca7d8db96022f87e

      • memory/620-57-0x0000000075711000-0x0000000075713000-memory.dmp

        Filesize

        8KB

      • memory/620-54-0x0000000072E21000-0x0000000072E24000-memory.dmp

        Filesize

        12KB

      • memory/620-55-0x00000000708A1000-0x00000000708A3000-memory.dmp

        Filesize

        8KB

      • memory/620-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/620-65-0x000000006BE51000-0x000000006BE53000-memory.dmp

        Filesize

        8KB

      • memory/620-66-0x0000000002460000-0x00000000024BD000-memory.dmp

        Filesize

        372KB

      • memory/620-58-0x000000007188D000-0x0000000071898000-memory.dmp

        Filesize

        44KB

      • memory/688-70-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-76-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-74-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-72-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-87-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-69-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-78-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-79-0x0000000000406400-mapping.dmp

      • memory/688-85-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/688-75-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/1192-94-0x0000000002A70000-0x0000000002A86000-memory.dmp

        Filesize

        88KB

      • memory/1744-63-0x0000000000000000-mapping.dmp

      • memory/1856-82-0x0000000000000000-mapping.dmp

      • memory/1856-92-0x000000007188D000-0x0000000071898000-memory.dmp

        Filesize

        44KB

      • memory/1856-93-0x000000007188D000-0x0000000071898000-memory.dmp

        Filesize

        44KB

      • memory/1904-60-0x000007FEFC331000-0x000007FEFC333000-memory.dmp

        Filesize

        8KB

      • memory/1904-59-0x0000000000000000-mapping.dmp