Analysis

  • max time kernel
    137s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2023, 14:13

General

  • Target

    1319f5b076dbd5b75d41c306a762b297.doc

  • Size

    37KB

  • MD5

    1319f5b076dbd5b75d41c306a762b297

  • SHA1

    1682a7ef1fcea059ebf4bb1458038d55f23af836

  • SHA256

    0016ab621d330177ecb0764d435fd311978e35b9c45c1cac8be5b945c478480f

  • SHA512

    d2417225e5e164ef92a6a271bc56058742c245edbd62ea088352ae5509f57d32802870334339728ec11b6a74427063d1af1e4d2fb7b18b8accb02709f900face

  • SSDEEP

    384:nprF3nfkolOCnC3p2MyM1Z5gB8iSwvxjk+tUSut/krY0jiUDhu:px3MoltC3d1Z54xw+txEqD

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1319f5b076dbd5b75d41c306a762b297.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1860
      • C:\Users\Admin\AppData\Local\Temp\jahah.png
        jahah.png
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Users\Admin\AppData\Local\Temp\jahah.png
          "C:\Users\Admin\AppData\Local\Temp\jahah.png"
          3⤵
            PID:1348
          • C:\Users\Admin\AppData\Local\Temp\jahah.png
            "C:\Users\Admin\AppData\Local\Temp\jahah.png"
            3⤵
              PID:1908
            • C:\Users\Admin\AppData\Local\Temp\jahah.png
              "C:\Users\Admin\AppData\Local\Temp\jahah.png"
              3⤵
                PID:1648
              • C:\Users\Admin\AppData\Local\Temp\jahah.png
                "C:\Users\Admin\AppData\Local\Temp\jahah.png"
                3⤵
                  PID:1288
                • C:\Users\Admin\AppData\Local\Temp\jahah.png
                  "C:\Users\Admin\AppData\Local\Temp\jahah.png"
                  3⤵
                    PID:988

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • C:\Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • \Users\Admin\AppData\Local\Temp\jahah.png

                Filesize

                273KB

                MD5

                908da2b3f1932cce84084df7d5ba2218

                SHA1

                5fae534ebc677cd5c424c0b17c45befbfd5adf97

                SHA256

                dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

                SHA512

                405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

              • memory/1124-67-0x00000000003E0000-0x000000000042A000-memory.dmp

                Filesize

                296KB

              • memory/1124-68-0x0000000000330000-0x0000000000376000-memory.dmp

                Filesize

                280KB

              • memory/1124-69-0x0000000000440000-0x000000000044A000-memory.dmp

                Filesize

                40KB

              • memory/1124-75-0x00000000047A0000-0x00000000047E0000-memory.dmp

                Filesize

                256KB

              • memory/1344-59-0x00000000003E0000-0x00000000004E0000-memory.dmp

                Filesize

                1024KB

              • memory/1344-58-0x00000000003E0000-0x00000000004E0000-memory.dmp

                Filesize

                1024KB

              • memory/1344-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

                Filesize

                64KB