Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2023 23:40

General

  • Target

    SecuriteInfo.com.not-a-virus.HEUR.Downloader.MSOffice.Alien.gen.18914.doc

  • Size

    1.1MB

  • MD5

    29835ed466ccc13d014f563c7d750db5

  • SHA1

    617b2671bf18760b44b88ddbf986fa5f3689810b

  • SHA256

    ed0650eb9d5784d336f42400bbf9da079f4e099401c090fda7dfdc89ed6764ef

  • SHA512

    dd69a17eecc0c5c46ed00195e41e0112880e9d6ee0bad36a400de0dbc406430c28b4f96a0c236b5b557a5f259066d5642c773c5d2c8f6ec78290920cda2b9434

  • SSDEEP

    24576:aSYuchKJeclat5QJOjyMzj8qDACPnRGkhDNwSMv7gWVGhWAcgo:kuchyatmcjyej8IAyG0WSMv7gqGhW

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.not-a-virus.HEUR.Downloader.MSOffice.Alien.gen.18914.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:776

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8011F37E.wmf
      Filesize

      370B

      MD5

      783e2615c483426f3e4a568023b98aa2

      SHA1

      d810ad2c097e4c6b5daf4ed4322fecca53bd948d

      SHA256

      c6df986c5d35a96db45b859e38edaa41af50fb4493ded149af9a6f1709a53ba4

      SHA512

      1e49672ec6a2fe01693475433d567b238a394495d0d4d8deb7cbc91f71bc3d733e66671d8cf7bf0b9d8a771f01819b26cb46fa53a0d5ecc961a0c21ff6a02abf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DE112EB.wmf
      Filesize

      598B

      MD5

      2694edc5ba4647d5682239c43f2f0f0f

      SHA1

      11b33b9ff397574a62b86ba499395c1bebc3ecbc

      SHA256

      3c9d625e3e4759808e9bd1cdfcdc104f9fd672ce621dead0375c914c4bc012df

      SHA512

      8ad5388a1ca0866d1662e70426ff9e61eb6a50c0296ef7f39b4cf41b2a2356321554352cf68c1b5a47877add5ccdd4955cbaff5375e6bbcb58f7fc517eb8a992

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      31da0517da67fa4b8ef31cd8b181b023

      SHA1

      a0faa997364b245bb5c4ed13b9084eac6d162a93

      SHA256

      27b30319b8d52777bcd2f82a5d787d2943012c4f4b14b82a7eb5be9752e30f83

      SHA512

      df87ef26576f26715ab57a6d10df2a5c9f5f76c7aeef952c5eea4d2c70b8ba38ade470d31eb0919d1ca7c130c5f3fb8dfff3a9a9ee4c3738dc3aec0e9fb0ad0e

    • memory/1172-98-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-106-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-93-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-94-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-95-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-96-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-97-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1172-99-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-92-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-112-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-113-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-120-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-127-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-134-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-141-0x0000000000400000-0x0000000000500000-memory.dmp
      Filesize

      1024KB

    • memory/1172-74-0x0000000006310000-0x0000000006410000-memory.dmp
      Filesize

      1024KB

    • memory/1172-177-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB