Analysis

  • max time kernel
    102s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/04/2023, 22:49

General

  • Target

    moodle.ymca-nitra.sk_pluginfile.php_333_mod_resource_content_1_pronouns.doc

  • Size

    98KB

  • MD5

    e7bd3e11e4f17c564bfa6c60dfb95c1f

  • SHA1

    f21d0de207d736eb0d283b2f0b713f7ab70c0815

  • SHA256

    766ede751889be8bb93ea6c77f338c584a3febb380268c6dcdb63cb87f582944

  • SHA512

    6b75e1ab0123095b2fae3bfcfd1f4bf1586e6812ea036cd87987e864efd860fdc59d65d973966f1d7936fe33373ed19fb51b0e47a159d73f40a1f440c28cbe80

  • SSDEEP

    1536:NFJtKeEa+kGGyUZd+suHRew5555555axAAVLD563+c3uGXq:NFJ2npUY0w5555555aAAVWeU

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\moodle.ymca-nitra.sk_pluginfile.php_333_mod_resource_content_1_pronouns.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1320

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D04EEDD.wmf

            Filesize

            370B

            MD5

            f054e149b8d458b3296328eaa2fcaaa0

            SHA1

            8589e72a940b89de2cf17ab1e32fac73b7ac4872

            SHA256

            91ee9a077a4fc9d5ad006b19d6883c8ae7ed88f9ede5eba273cfef1d3bd6551d

            SHA512

            5bdc21a1303311f7b8d0fa90fa6b87388e8e0615b2fc22196c38a8c37a950e2a2f78fd6e6827c85dc5d6c7e4db5d72bb39dd3bcafcbe7f8338af1fba74e72de3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\596DFF89.wmf

            Filesize

            370B

            MD5

            271d85431b6b680813e35000305ddd89

            SHA1

            b943a11edf9612f9feca7d91985afb473191ebc5

            SHA256

            041186bc3112af22e8608a6db5ffbc11ea061eb66aa095d902bf2e30d482c032

            SHA512

            700308335934104e86fe47c8dbcb0b7d9e1864b1c8acd524505258440bb2d2734696a03447d8f0822e042c3156b6e0b580dfc2f36342f2e5d946a32773268b19

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6501B050.wmf

            Filesize

            370B

            MD5

            89b4a06c750babc43691c564765fd2e9

            SHA1

            266e87f092eb148d26a2b942ccd9cee0b33539f9

            SHA256

            4c20a253f9d1a25ddc283838db80b94ef72e547ea87c01e0838ef1e10c0e1ff5

            SHA512

            7ec980cde6c6d09ee87c9a8a8313520483eded587b67dfec17f1e2d49e33de1ad9c02310919035aa6c7c225de84000d02199fb0733e3c76112ff8c2cc612c50f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8CECB13B.wmf

            Filesize

            370B

            MD5

            a2b08beeab45d562456e9eb4955231bb

            SHA1

            6ec82930385ffdc8b713425d22f37491d1aa344d

            SHA256

            25ffa656a6b7bc9f76dc0bb2127d111cd1340cba04e199025f80799e9310f4de

            SHA512

            1e1edf345cc753e39d18b6064743eb22e9c8c11b5efbe47180ff62518408ec1a8929a921242f7bffe015f1d4eb38a4e5804f750b934a7811dc3c9163aaa74c3e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E9008147.wmf

            Filesize

            370B

            MD5

            e773a6e1c38c92d4241e3cfe642ae0c5

            SHA1

            9b9fedb49006d36fd0b7c882ca75ccef21c4e06e

            SHA256

            f902e928d003e34f43d03d21c0ab48c638107bdd17108658a2b39c0bf399ab5c

            SHA512

            a63951d392912f95bd6bc814433a1c90cafa9888fa96cecd3c9c08b0c1b111607d238e118cbe548fefb58985c3d417a0f4b899ef80be32015ca95559ba5611fa

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            b8d61d5b449d2de5ef6c2620b43b6263

            SHA1

            48f5fdd1b551e48090943290028136b9afb920c0

            SHA256

            ccb903e079d28ffbaf801f2e508c42e082a00f16dee66fcc70121e9db4cdb68b

            SHA512

            0cb4b863bcbdb4288c2534dad3f02838ce22e7bf4a806747c2a67a21a12866391567892beba9159db72ee5c59a61eab54c5333b1dcfbb7f7329a52d8b10934ff

          • memory/1236-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1236-138-0x0000000005D90000-0x0000000005E90000-memory.dmp

            Filesize

            1024KB

          • memory/1236-193-0x0000000005D90000-0x0000000005E90000-memory.dmp

            Filesize

            1024KB

          • memory/1236-209-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB