Analysis

  • max time kernel
    243s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2023 02:26

General

  • Target

    GO-1525 Supplier Information Form.docx

  • Size

    32KB

  • MD5

    d6e5b03717e15918de51aaa7791e8b72

  • SHA1

    b598abfaff2e1d48f3a9c8e91010cf3a41351831

  • SHA256

    174261e457a8929d8a4a915c83bead8fccd2cd7c7d02fe4b1b6fb772e294321a

  • SHA512

    7e8e190b85e46c9aa18f3321f5a3ce7b11d804c5e7b7a8ff05594a596859ee7e976c8c270622422dac6616da0b9bad9b8f208e1a24dc80796f45530dc800b8af

  • SSDEEP

    768:/RSXzWsnYoSA56B0ywu6oGZUd6bKWLmvXdi2x63p7:/Snzp3ylCfpLm/d7x63p7

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\GO-1525 Supplier Information Form.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      e6afb6cb9af2a5bf692534e8f488aa0c

      SHA1

      7ea6cfcaf94e74f6a915e36459c7db850abd1e92

      SHA256

      93f751125872ef6474fbf0b0d1c3d7f7d292eba0f98e6911633a06d4733b084c

      SHA512

      5398c61c6dd94edb5e673c70726a43f042485a9f57812d5d7fafe7c02c973273faafba60273c82ca93db49a6ef5fcb3dcb2a2145f74955236baf28043a525012

    • memory/1368-0-0x000000002F830000-0x000000002F98D000-memory.dmp

      Filesize

      1.4MB

    • memory/1368-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1368-2-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/1368-14-0x000000002F830000-0x000000002F98D000-memory.dmp

      Filesize

      1.4MB

    • memory/1368-15-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/1368-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB