Analysis

  • max time kernel
    134s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:43

General

  • Target

    بررسی رابطه بین سبک های تفکر، باورهای غیر منطقی و شیوه �.doc

  • Size

    2.4MB

  • MD5

    cf54b38c5ac4eb39ec7e60c9d0a61e7a

  • SHA1

    0d906c82ae4e1f5eefdf61baebc5fa9a4c92078f

  • SHA256

    ea8008dcbef93b83954f001ceb518b89ac2b6121bd235291ad3236ea4a4e9c53

  • SHA512

    53605cc836e3c599174e0d38d0e65009aa5889696cd2b709e79f792f04be9432548b548bbbfe3ce31ad466dd0f02eada631d41e925f9f5ff9d8917853db4115e

  • SSDEEP

    24576:/gUkMbhMnLIQvAYqgbEzd00opAi3KRcl6NyvxEogZ:RenL7A3

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\بررسی رابطه بین سبک های تفکر، باورهای غیر منطقی و شیوه �.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2640

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\92B5B7E1.emf

            Filesize

            963KB

            MD5

            16d4390cd01e5983480c998eb08667b9

            SHA1

            529ff8cf4d8b9098e7e5ef19c477cea2942bc8f0

            SHA256

            fe266d5c72e2fc92c86095b6551e01ff4bb8d1314dad623340b9e04f4a6b7380

            SHA512

            8408f7ba55498ebd3c52c08cf09f12781e448cce458ed30cabfe4eb37d298848b739e05533e64da0b29d050f543d5e44c32fc75fca3bfe267e1ec8277ff4dd5e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE230ED4.emf

            Filesize

            963KB

            MD5

            3694c55d7c92de94f383ad9dcb8388d3

            SHA1

            15b92005e71434bd3c59bb662dd1d69c847ffbe7

            SHA256

            60c46eb0c88805488dd3a7336da5f1b910bb007efb2d2d8c3207a798fe2b2753

            SHA512

            beb24bfb97252b74abf33993b022a43e7883171bc1f43e6ad8c4cfe7692a2a7e10fde266d65817f703dce0a4832caf84103c7ced8bbefb9c30f33e222cd751ba

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            da46de67b6a60e1d6ce5fca918e8bea6

            SHA1

            57bc8518da4da4716f3eaf9551a8c4431e8537d9

            SHA256

            3b158a53a0c673c2ba90ce5a97aed4508401503ec3a6ad455168ba948147d9b3

            SHA512

            cc38a901fd0fad5b1ff64a0f6a6e38c3e81d405e56d41ade03d55476460f995833d11c5bed44fdba4b4281a37fc9c15bfd205a947bc7bff0f1e65ccddfbf3b46

          • memory/3056-0-0x000000002F5A1000-0x000000002F5A2000-memory.dmp

            Filesize

            4KB

          • memory/3056-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3056-2-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB

          • memory/3056-11-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB

          • memory/3056-42-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3056-63-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB