Analysis

  • max time kernel
    70s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2023 03:45

General

  • Target

    Exercises on form.doc

  • Size

    198KB

  • MD5

    3055dcadfe483d8002d1999aaf117be3

  • SHA1

    205d4f3147259d4ea7ee50c10c9a84e1dbbdafbc

  • SHA256

    7624feae9127bb4a6a0e38d911853f96db39f1272a48be72bef322e87f3719b0

  • SHA512

    8120670c8c38fabec777e8e6a1dcc69a555a827dec0b80fb786348c7ccf1cc0aab37c4c51a60c23e159efe857628356c7985e1850fc74eb2ac4cc4b86bcc8fa1

  • SSDEEP

    3072:UGyX60FBUHqE97pe2yd8SorRYKX117eCL4JH:UbB5MVKdAFYKX1peZ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Exercises on form.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1512

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\979AB142.wmf
      Filesize

      370B

      MD5

      7f1202abd71c3319e0eff3cc6dc7adf2

      SHA1

      1fdc7e8d0c418e3369149445c32cabbbaeeb95c5

      SHA256

      93d29b01030f10e2471856b4a977851f5403e63619d65d2b115200b8361daa37

      SHA512

      f04b60fb3a2170613d1fc57a617670a6385c3f975b18173bd23b247e211ba58496d47922b3f38d1a61e7d28ee643df712911c703253a24689185f9f053d44f26

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D1248FD.wmf
      Filesize

      370B

      MD5

      271d85431b6b680813e35000305ddd89

      SHA1

      b943a11edf9612f9feca7d91985afb473191ebc5

      SHA256

      041186bc3112af22e8608a6db5ffbc11ea061eb66aa095d902bf2e30d482c032

      SHA512

      700308335934104e86fe47c8dbcb0b7d9e1864b1c8acd524505258440bb2d2734696a03447d8f0822e042c3156b6e0b580dfc2f36342f2e5d946a32773268b19

    • memory/1604-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1604-255-0x00000000072A0000-0x00000000073A0000-memory.dmp
      Filesize

      1024KB

    • memory/1604-513-0x00000000072A0000-0x00000000073A0000-memory.dmp
      Filesize

      1024KB