Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:01

General

  • Target

    رابطه راهکار های انگیزشی سبک های یادگیری و منبع کنترل ب.docx

  • Size

    2.2MB

  • MD5

    6ecad215c99c5b6374f02854cb159695

  • SHA1

    9fcdd84bff0709eaaa289909872bf274ea9c2869

  • SHA256

    9a39bd3d97db5092f0c32e1560864fe562f1f2956226533704903e0ce7303b58

  • SHA512

    3ab5f1cf241eb263738e5c28d417850ca777512836c2b45d7023110f2d04ebe3e2be050c0bc29562a8f669bf78ab129e7bdf099d9c6da0ec72009dd5cc3f2c5f

  • SSDEEP

    24576:HNu4XDkEKCnsA81Ox17WXCC+IlwHXYxPvuj93QOpd5rOFHNBhjOLhMBjSBB2HMLZ:H5MSsraWlwoohr0BhTNc/Pbdv

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\رابطه راهکار های انگیزشی سبک های یادگیری و منبع کنترل ب.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1156

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            8751048b9c4a34f6d7653e75613af2cd

            SHA1

            2f47df60add9b608b412668147f2efc716c9eb0a

            SHA256

            16ab4216b2b30f5166ad7c3e38d4a8a99290ceeb7f749f026d74212aca301ace

            SHA512

            0fcc8bc56659f9ecf0ec3819672dcf67f0efac9a3d06723572819bda135e475987214ec1a06e970911cea8f6d9bdacbcedb3efb20b77ba7e551222ed31aa2732

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • memory/2168-0-0x000000002FD01000-0x000000002FD02000-memory.dmp

            Filesize

            4KB

          • memory/2168-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2168-2-0x000000007159D000-0x00000000715A8000-memory.dmp

            Filesize

            44KB

          • memory/2168-38-0x000000007159D000-0x00000000715A8000-memory.dmp

            Filesize

            44KB

          • memory/2168-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB