Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2023 02:23

General

  • Target

    GO-1525 Supplier Information Form.docx

  • Size

    32KB

  • MD5

    d6e5b03717e15918de51aaa7791e8b72

  • SHA1

    b598abfaff2e1d48f3a9c8e91010cf3a41351831

  • SHA256

    174261e457a8929d8a4a915c83bead8fccd2cd7c7d02fe4b1b6fb772e294321a

  • SHA512

    7e8e190b85e46c9aa18f3321f5a3ce7b11d804c5e7b7a8ff05594a596859ee7e976c8c270622422dac6616da0b9bad9b8f208e1a24dc80796f45530dc800b8af

  • SSDEEP

    768:/RSXzWsnYoSA56B0ywu6oGZUd6bKWLmvXdi2x63p7:/Snzp3ylCfpLm/d7x63p7

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\GO-1525 Supplier Information Form.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      831cdb8a3045f9ff52ce248012ef9f10

      SHA1

      a6d2b550c422c7825f6d114df9aa1c0ebed8b7a9

      SHA256

      cae7b97ed77deb048d3c3f95277ab051ed4b1641134ba652e4add8ca7e15d6d8

      SHA512

      ca903eb2102c8d01c8b0ee2339b06f9414af442934667b410d81d2008103570c73dfefcf64d13a7da4763bfb6e3c3b6e7384f16dfc2ec0d1f2ba4460da94ac80

    • memory/1712-0-0x000000002F740000-0x000000002F89D000-memory.dmp

      Filesize

      1.4MB

    • memory/1712-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1712-2-0x000000007159D000-0x00000000715A8000-memory.dmp

      Filesize

      44KB

    • memory/1712-14-0x000000002F740000-0x000000002F89D000-memory.dmp

      Filesize

      1.4MB

    • memory/1712-15-0x000000007159D000-0x00000000715A8000-memory.dmp

      Filesize

      44KB

    • memory/1712-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB