Resubmissions

09/02/2024, 13:49

240209-q4wclsbf9x 1

10/10/2023, 13:53

231010-q6zstadh3z 4

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 13:53

General

  • Target

    Order Specification.docx

  • Size

    1.9MB

  • MD5

    8417c579dc41ca5bf7e917121a3b3e49

  • SHA1

    5caec24751932b1152125e2b405364b7a2762291

  • SHA256

    6180214e6bac17bdaa2b0a17490cc17a13ad2cf0aed7061910e6e58552afc0db

  • SHA512

    72d3622e0d0774b9c7d488ffdd2c473094170bcdd81fb0fbdb02502fb19ac2e4dd518ad59a439c60c05a3658594504126c655c4720ee11bfd77ecf1c4364afe1

  • SSDEEP

    49152:J2AXONpW9eRk6vnJgxsihNHivFyBKsTCCBXL0x6hTe46hyE/L3xd98:J2fNNu6v2xsiLivFdqCGoQhC4iZ/LxdG

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order Specification.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\51F38A55.emf

      Filesize

      5KB

      MD5

      d3f85acc7fde0b72c69bb97e7746c666

      SHA1

      ab6492be0ba3d02a69a520021b50029026340790

      SHA256

      af2777323520bc44447af0e66e48e43cd8955bec08586b763bd590b27ee1ba7d

      SHA512

      25d7faf0c81ac76dd8d425e53c9a7d0b1a2277765c1f3d91f8ca38ea0d17d43ec653b1460548a10eeb212e8995bda399a52c83ea14ca3518af9748966ce643c6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9f0585e5eb3f9eeb60f003830e18053f

      SHA1

      fb5744182a6cfbbf5e2d14080464b95e81740b09

      SHA256

      b27ac69668acfa0449094a32825d9935ad28e4639b8d47339d41d91b229ad88c

      SHA512

      bd94dc37bed02471c1ce24b5722b6cfb0c2f3c30d840f4913e38d3bbf2799357bd92fd8d9860197a32621669c927f2d7317fe4233f3b2426525af9639a0feed3

    • memory/2164-0-0x000000002F661000-0x000000002F662000-memory.dmp

      Filesize

      4KB

    • memory/2164-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2164-2-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2164-23-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2164-47-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2164-50-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB