Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:34

General

  • Target

    smartsoft_4.1.7/license/SmartSoft SSI License.rtf

  • Size

    8KB

  • MD5

    58a6ab9ba235e1054bd0f406a10786d5

  • SHA1

    e78a9d31122c3e17be3342ffd71634afbdf517fb

  • SHA256

    8ccd1cf3d6c8278131474fda8f6c2348073c2aa8664d624d901d81eb4457d449

  • SHA512

    8202283003731354cd770ee3a4da84a53df2f3565a6179e0c42d811180623099839f0d1bdcd81a9568aa6d1124d1890b155f54f284d2eba36aaff53b68b72803

  • SSDEEP

    192:CKYmfJJn6lHd8OpIzMxKJBcKezczLBIzTzmVTzTttBIpO7+uq:CKMK3JFx+Ln

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\smartsoft_4.1.7\license\SmartSoft SSI License.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      71f8c0bfbddb456585d56bcf009b8da9

      SHA1

      e568efbd7d6517f67c68bce5a6948160c1e8c1bc

      SHA256

      1b6d9cfc69e3d826ebbbac7dd43cde14c9a35ec4d4d3b269c430e46e3009e80e

      SHA512

      da119e0d7488e0402fdfb5a96a121126f11c7d30b38b7e0100b58f3b4ca2256ae9e6c497d083bb3763737186e822a8097598909fb47b18f48452799361ec5fea

    • memory/2788-0-0x000000002F151000-0x000000002F152000-memory.dmp

      Filesize

      4KB

    • memory/2788-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2788-2-0x000000007131D000-0x0000000071328000-memory.dmp

      Filesize

      44KB

    • memory/2788-10-0x000000007131D000-0x0000000071328000-memory.dmp

      Filesize

      44KB

    • memory/2788-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB