Analysis

  • max time kernel
    108s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 08:48

General

  • Target

    a69c1b43ed2931d02a7f1785b0818a2f.dotm

  • Size

    23KB

  • MD5

    a69c1b43ed2931d02a7f1785b0818a2f

  • SHA1

    8c22f9d345bd25c77c95acaa55e46117ef76b7f6

  • SHA256

    01995646493aefd8cb4924d260b65eae12d2376ceaa212b744202555e785ad9e

  • SHA512

    7b249c6d595e56003570c6b064ef26195482282ba6e56d1f65220bbe0205013f85c29427fdf60bf4f6a252dd1deefd563a2936a396d73f09158787b4743f5ac4

  • SSDEEP

    384:C6LZC78ttHQ7sqCWtVFaaWGoB1uGaVQF9p0lhS0wCzLizefxY4W7Y:Bq8ttjvWtba2oaQvp0lhS0DzLwefxY0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a69c1b43ed2931d02a7f1785b0818a2f.dotm"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a69c1b43ed2931d02a7f1785b0818a2f.dotm
      Filesize

      29KB

      MD5

      bf2d622fe8fd253ce84c2f79c8cbabc7

      SHA1

      0ead1b7b42ce1fb31c6986193c4559465b86dc68

      SHA256

      9b6e3406fa59e5f3c0dc46a1ef7117c83de316f30e2593cc62129b5bd85c1d07

      SHA512

      be2a1724745e94c55ff75894be67d2eebada2c27464336df1459752a7b47f5bf2c0d71fbe6f72de60a054d1bcb046747032597c106f91af05611a73c945f4610

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      25KB

      MD5

      4cec50c78b2a3c2c9bc277bb60d3bd39

      SHA1

      a4c185875d4af25e1fd932faed9a1935ef33316b

      SHA256

      d76450e86873fc973ef66f9bfd2ff4d6bf8a7449a97844acb0b1c7a470d2f55a

      SHA512

      3cd9821d3c11d006c6140c5951e70b124d478eba976643fa5829773d5d7bdbe2881e8a0f843dc94e2985d432dbbfb42eaea003f898297bbf509ed842e375922c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      24KB

      MD5

      cf897c252fc7c0bfe83d21eeeab342e6

      SHA1

      19655e4d64b638d9994ffbe34313a6b5d9683e25

      SHA256

      9ac0545b1202428f2d8fd402607c97b7d0b12381a0650b8407ef6d7a2562c3a6

      SHA512

      945eb307b426e513ebc1c4d3416d13cce9e4409a7f4619cc9b50128756a7b80979ec4a6668b188ae677fa5d1b91ba8e0f228ae9f0589f222d1b59a07de8ecaef

    • C:\temp.tmp
      Filesize

      2KB

      MD5

      05b3d2c64f145c0e2438c84c793b31b0

      SHA1

      6aac20d4a2f53e9c8a0f645ce0678e37873bcc01

      SHA256

      223796b180da68d58816744f241ff1db184f4a165ec0ac62130ff7c8a1783739

      SHA512

      a90d3fa228b22ef3f84484652118c06f90c9fd10733e361cf2b5d197b1e4bd269139e3cbea457dc339791c117be43d20edb0bb72f54244b4a337b29021607138

    • memory/1256-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1256-145-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB