Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 13:29

General

  • Target

    30290500699597a4c11ede5ae6d624f44afee2132e630c266d85506f1fc5e3fb.exe

  • Size

    3.9MB

  • MD5

    92263c40931a39f74b9f9103e967ab73

  • SHA1

    df5fe993b0ef135a831a7bf9484df1d35ecb1f78

  • SHA256

    30290500699597a4c11ede5ae6d624f44afee2132e630c266d85506f1fc5e3fb

  • SHA512

    3b4650ef220daabc5b1350032e0d1307b70e0135681646e7a26e46a10310ab2b84016429e3322bf3014c38f726e0b7bb78f2fc72fe6ff2776954df7685495064

  • SSDEEP

    49152:qmxlNVWJBKvboxLvLg0JJnYKLZc5ZvIRMoqJ3P+:qmxb+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30290500699597a4c11ede5ae6d624f44afee2132e630c266d85506f1fc5e3fb.exe
    "C:\Users\Admin\AppData\Local\Temp\30290500699597a4c11ede5ae6d624f44afee2132e630c266d85506f1fc5e3fb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\system32\cmd.exe
      cmd /k start a.docx
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a.docx"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:2552
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Windows\Temp\4.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\Temp\4.exe
          C:\Windows\Temp\4.exe
          3⤵
          • Executes dropped EXE
          PID:2792
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c del outfile.exe
        2⤵
          PID:2712

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\a.docx

              Filesize

              9KB

              MD5

              69a8e4d41bd53f52922d89d2247c556b

              SHA1

              6440bec7ae4a10dac314de2d842a6227ff17bc16

              SHA256

              242389c57507a3b5c1da5af2eca1ada4f2a248434352aa52d88075c52ce34ead

              SHA512

              225f6cddf3c023c0d8079e1eef363ffa8f0575e13ddef594172488262d2d23d1f70c5a16e4faaed15db51bdfc64a1eb587288ebc0ea3592fd04d9edffd69876c

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              df08385be011a4e67b5ac2765db01182

              SHA1

              6e491c4ae3b5611c9fdb2baca39b29e5cf31191d

              SHA256

              390c54f502f9e2d0ca60d8d160955fb1ad3fcf4c0e229d2d8af7648b4d7fd614

              SHA512

              491310235dd78b3acdafaa748cbbaf6a90d713c38dd3291e5d2c049a9a486531777aa981bdda48268b02f1a71cf6aaa8d6d8b0d6d2f2a551b988c9d1323fc806

            • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

              Filesize

              2B

              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Windows\Temp\4.exe

              Filesize

              1.7MB

              MD5

              6eded1e524244c958fab87fe9895c84e

              SHA1

              efb4098ba388c876eeb479cf5614c86bc6f55d0d

              SHA256

              f3182cf783fd2051e547c50a70a08fc94869481b99b7e2937fd87e25081c524d

              SHA512

              433feb9f7998f409b94cfa5e3a69f5fad6a5dfbd60d4edf6fb7f9d5ee75a65c8de41cc65a9bd21581564477f738369333b12e06b549c248920e8494832239b7f

            • \Windows\Temp\4.exe

              Filesize

              1.7MB

              MD5

              6eded1e524244c958fab87fe9895c84e

              SHA1

              efb4098ba388c876eeb479cf5614c86bc6f55d0d

              SHA256

              f3182cf783fd2051e547c50a70a08fc94869481b99b7e2937fd87e25081c524d

              SHA512

              433feb9f7998f409b94cfa5e3a69f5fad6a5dfbd60d4edf6fb7f9d5ee75a65c8de41cc65a9bd21581564477f738369333b12e06b549c248920e8494832239b7f

            • memory/2452-2-0x000000013F5B0000-0x000000013F9A3000-memory.dmp

              Filesize

              3.9MB

            • memory/2704-31-0x000000002F851000-0x000000002F852000-memory.dmp

              Filesize

              4KB

            • memory/2704-34-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2704-35-0x0000000070D5D000-0x0000000070D68000-memory.dmp

              Filesize

              44KB

            • memory/2704-54-0x0000000070D5D000-0x0000000070D68000-memory.dmp

              Filesize

              44KB

            • memory/2704-72-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2704-73-0x0000000070D5D000-0x0000000070D68000-memory.dmp

              Filesize

              44KB

            • memory/2752-6-0x0000000140000000-0x00000001402D6000-memory.dmp

              Filesize

              2.8MB

            • memory/2792-8-0x0000000140000000-0x00000001402D6000-memory.dmp

              Filesize

              2.8MB