Analysis

  • max time kernel
    102s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2023, 15:29

General

  • Target

    ֘Aij/pirj.docx

  • Size

    69KB

  • MD5

    2e07254c63e2e21fb3577a097be389f7

  • SHA1

    7d178e7a629e3df5e121added5d08338b5fbc31f

  • SHA256

    9d473f71411b4bdd80bc9eda00fd52503ecd853c31a7b7b2adf5afe02c116542

  • SHA512

    f4f45e9fdf292186c96978022ab68370dc0696944520a48497b00279cb64e2515803e37353a45813f077331075cf0bce70f6b09ab1a2498054cca0771fc1cd0d

  • SSDEEP

    1536:hkx0rTvNRdP90QFP9RHn4DY3HoZeCsoAxU6ujaQkUHS:Ox0rThl0QFTn4IIZeW6udnS

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\֘Aij\pirj.docx"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1192

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            d7903f7f9740c4d198df38afe246d17c

            SHA1

            19a759ac341f6ad806e09d02b7517cc8043a372c

            SHA256

            5fcd64a8e51db1742153e0d0b33a5768c70e6ab34f5c9bb33659390dc591c0d2

            SHA512

            b9ecd6c75aa01fc4a55408db1ae6bd16083d355eba40d579f62c1122b533b7f63f3b84e561e7733a0e776fc393aec54aa7e8af44230ce58f16c60b649c99fd12

          • memory/1312-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1312-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB