Analysis

  • max time kernel
    240s
  • max time network
    284s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 07:46

General

  • Target

    WYCIECZKA_Kazimierz_Dolny-Automatycznie-zapisany.docx

  • Size

    12KB

  • MD5

    128e14a0c068978246d764648c08453e

  • SHA1

    a627964e8bebded09f85280e2cf46a1e4b343701

  • SHA256

    de127cca73e3075d73fc2bbe9784a46b1399cd5a31ecc611d8ebd3a95ad23a7f

  • SHA512

    14a04596d66e0787af0cc3679387988bbffa48e2eee78891d99d0c13f9212ba5e6db5b86c421a1410e81bf6a8d4473c94feeeb2f5769ecd1574c7f212732a551

  • SSDEEP

    192:ScIMmtPR7KPebFbGYNp57N4NkPrZ+iocMFBl5towi3qjdC/:SPX5+GbAY57NprqFBTthiajdS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\WYCIECZKA_Kazimierz_Dolny-Automatycznie-zapisany.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c85807ba726a3421ae5e4f4098406489

      SHA1

      5e9e644a8437937407ccb38ded6afe2d86b91ce8

      SHA256

      999a33d220b1d52d1899b325023dd7edc21d7703279a7edd117adc6fcdbf7bf6

      SHA512

      c8025b557ac2d2f73a3024fd11c502f25d978be64d279bf2bfcc173aa478cadd0d4c7b4ae1f2e7dc2a17f31c4ab77ca8f42e27a070c7d8bde87f91eefc5bcb74

    • memory/2868-0-0x000000002F851000-0x000000002F852000-memory.dmp

      Filesize

      4KB

    • memory/2868-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2868-2-0x000000007116D000-0x0000000071178000-memory.dmp

      Filesize

      44KB

    • memory/2868-3-0x000000007116D000-0x0000000071178000-memory.dmp

      Filesize

      44KB

    • memory/2868-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2868-30-0x000000007116D000-0x0000000071178000-memory.dmp

      Filesize

      44KB