Resubmissions

18/09/2023, 12:45

230918-py158shc9v 1

18/09/2023, 12:39

230918-pv2btshc8w 1

18/09/2023, 12:31

230918-pqjwzsbf35 1

18/09/2023, 12:24

230918-pk72mahc3w 4

18/09/2023, 12:20

230918-ph3dcsbe88 1

18/09/2023, 12:17

230918-pgaxqabe82 1

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2023, 12:24

General

  • Target

    FC88BEEB7425AEFA5E8936E06849F484_~$INWORD_

  • Size

    162B

  • MD5

    fc88beeb7425aefa5e8936e06849f484

  • SHA1

    3df841579c383f0fb02b30ba4958add6d43216a9

  • SHA256

    1affee2a7a8d587184faaf2e3a21754b6bbaccbf357c0aa61c8586b19f2b284f

  • SHA512

    d01f99363cb0c88caa739cb17626020009f92de82c642f5244c221c0352d20f35c304893dc2b3f0f2cdf59eb89a54411dc47766d5ef1bbdc5a0ab00ad4f3e293

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FC88BEEB7425AEFA5E8936E06849F484_~$INWORD_
    1⤵
      PID:1300
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:3024
      • C:\Windows\System32\rundll32.exe
        "C:\Windows\System32\rundll32.exe" shell32.dll,Options_RunDLL 0
        1⤵
          PID:1308
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FC88BEEB7425AEFA5E8936E06849F484_~$INWORD_.doc"
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2076
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FC88BEEB7425AEFA5E8936E06849F484_~$INWORD_.vbs"
          1⤵
            PID:2168

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            2195ce891b1d3f9ea45352d42ba761c3

            SHA1

            33da633878e10ea8d4baff112f70f797656fab1a

            SHA256

            60ba075a57f16fa5267d1a3471f19605620f1fdd14e1b277c5439e46cefc51fe

            SHA512

            eb823068594d2ff0511855eb3af9bb15204021c4b104af9e883195381f62b93302369d34265dd28a16399e0c8342b680e351fe4369413963a67b23e6e3c2087f

          • memory/2076-0-0x000000002F981000-0x000000002F982000-memory.dmp

            Filesize

            4KB

          • memory/2076-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2076-2-0x00000000714FD000-0x0000000071508000-memory.dmp

            Filesize

            44KB

          • memory/2076-10-0x00000000714FD000-0x0000000071508000-memory.dmp

            Filesize

            44KB

          • memory/2076-25-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2076-26-0x00000000714FD000-0x0000000071508000-memory.dmp

            Filesize

            44KB