Analysis

  • max time kernel
    102s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2023 22:50

General

  • Target

    corso1.wikispaces.com_file_view_brass_ricerca.doc

  • Size

    87KB

  • MD5

    70c0e541acecc68f09e766358c753342

  • SHA1

    425b000d64b22fb7b60c7416a8f8e3fca6b5f709

  • SHA256

    e71d03648dbd2c57a4daf01ab36a6a28a3477f501d9d4db81ee24d80716f4cb1

  • SHA512

    9ecb97d27357b8966ef0a97ee9c2a48563c5c7e2ed7d19b977f902f0bd4270f269a85e6372d99c8265be8552801062c2c9cb425b4a357f827188be168d26f142

  • SSDEEP

    1536:sujVZ2E71ExilI46pIIGIDJ+HpWfl2vNr4Feq:1jiE71Exi/J7bJvG

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\corso1.wikispaces.com_file_view_brass_ricerca.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:992

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\792B7843.wmf
      Filesize

      576B

      MD5

      5397b157c3cf230ddb6798a155e7b913

      SHA1

      371ec7d8cfed6cd9daabf077b16099505ed3f5ea

      SHA256

      a8d8bb441f0ffc6c75b5121ebea9125eee0a04494891ae399fe2779bb1125f18

      SHA512

      c827d6c24d9ab043b7fe4476f865ecdbdce58976ed5957e29585fa2778ff07d159dee1ef05a17f4c42d2dc53238d1bebe467dd20ac6445c34b496401a27fed2c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E58A3ACA.wmf
      Filesize

      576B

      MD5

      b68d35129dd11c18ab44f2718824847c

      SHA1

      6ffce2d07f16b95f64cf1d4ffc11ea7092b65f9c

      SHA256

      6001560fd2803ee9fd24b0d05d8e7b626c045e73bccad4dd69abe36c2d9c1dee

      SHA512

      27fc0b045324a47efa38e4a6e2cfe9ff189bdc9836487bbc4eb2c86a1d38e79b2f5e718903371c7def9a3bca82a2374cb258013c0c1b1b7523d6a790f029b9d7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      244491e09a5497c2ac086716f414ff83

      SHA1

      8473dec6433b1fccf87bac0157510b83d74ee42d

      SHA256

      d4af54f1c0a90874ce5e369a37eb3a691bf1ebbec727fe9dd545f90d8f4aa89c

      SHA512

      0cde54bf3d3e626c9d134adcb3fb51f61d9f3e7971858505f2911c26a2ed18bb5f0ed1f9e7ffdff64931f8d0c081f7dd1832750b98ac6dd078033caf69f7e47b

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1308-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1308-75-0x0000000005580000-0x0000000005680000-memory.dmp
      Filesize

      1024KB

    • memory/1308-85-0x0000000005580000-0x0000000005680000-memory.dmp
      Filesize

      1024KB

    • memory/1308-101-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB