Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 21:59

General

  • Target

    secdoctemplate.doc

  • Size

    12KB

  • MD5

    64def520385ac370f1ebd5ae5a331437

  • SHA1

    c88a42da3acf254e0016822454646a9ece2bc554

  • SHA256

    bf5b74314821ba40594d071c6c75f1327d539468b3b9e3f94d3508cffd971b14

  • SHA512

    a5a800c24a39860a1a5c9bed419f641680abb860f9eaffbfb52be18182f607f73cbf98e13239d45e5a32d6ac8afc7621390f6d597cbb1b4e741e4510d1ac32e8

  • SSDEEP

    96:EUXMXrHaTek1+129hlok9/YT97TJh1LnB/QWaT8EoLYjLJ75:EUcXrr7m9/YT97TJh1d/Qlbom5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\secdoctemplate.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      f9ab9e3ca29be7e2be48049c2656f006

      SHA1

      a752adad0c5617cdf257e6dfbf24077ad20cfffc

      SHA256

      3c4d7485c593499cc42f70f8410c68afbd0d448fdff9fd9186b6b55c233ac870

      SHA512

      01400e2f973a38eceb54dc347237226e9388ffea7805a2c1149bcecb9c30b0a03e6a052a9e69e5492c1ef6503ae9f8f43b921bc781413988248c1d4b9dbc6d4c

    • memory/2248-0-0x000000002F5C1000-0x000000002F5C2000-memory.dmp

      Filesize

      4KB

    • memory/2248-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2248-2-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/2248-10-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/2248-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2248-27-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB