Analysis

  • max time kernel
    59s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2023 23:49

General

  • Target

    Mesen (Windows).zip

  • Size

    15.9MB

  • MD5

    a55d2d00fb3a43be31ce1732818c33e3

  • SHA1

    5dd0b1a246f22be1d0e1175fff9eb8c569068cad

  • SHA256

    5a9a8ff0dbe1a780581ab60e89e1196166f1a11da29b316bb331b072fc5c50ec

  • SHA512

    87ff731279f4cf5b06d4747c1adcc5e9abdffc079493d6410a79c252f37fb7cc5f637fd70bcace81b2fd20fa10ddd0f6b9b400955ebf5fe4661f298b57da3acd

  • SSDEEP

    393216:lawMv5zWQO6KdmVMnEXXf7acccvIVfO/EDZ6HfnL:lawvQhKdcMMXzOlO/ED8HfnL

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Mesen (Windows).zip"
    1⤵
      PID:1612
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\TestResume.dotm"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:976

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      ced602c98b5860641c6abf0e01ce1df6

      SHA1

      41cd5ccf328624bdb582c9e1d419edbde119c957

      SHA256

      d6dca7d794816b11844007baf4bd7faa1a0cbc58b300d9cb8fda5be91151b580

      SHA512

      dbff261ce21e8bd887bc43e9c759b0a79f6edd6618901180af685054ce17768086747ec52f4fb256820ac52af656b7b77f38612c9991546a0bb4f207736e5e37

    • memory/976-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/976-76-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB