Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 15:25

General

  • Target

    388a795443993d58478b044c4265ed21a5c465fa685029b66c6b33d9209575a9.exe

  • Size

    525KB

  • MD5

    a7dfe0874f424f008eec5df9c3920f7a

  • SHA1

    7b395cbb60713d86af0b02b07bfc85337eda0503

  • SHA256

    388a795443993d58478b044c4265ed21a5c465fa685029b66c6b33d9209575a9

  • SHA512

    42efc318b84bfbbfbc406f5973b92728d0ef8b6390a20cbba9894f540d90957e0572930cdede3d775504617aee9d7b2f0bd5e677ee92e0c5b9aa077a5d8ad9e1

  • SSDEEP

    12288:/LMEalqxXblqoRX5qbfphLxaOh7uZO8WBPgh6:zqaXNabfphLxa/cFZgU

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\388a795443993d58478b044c4265ed21a5c465fa685029b66c6b33d9209575a9.exe
    "C:\Users\Admin\AppData\Local\Temp\388a795443993d58478b044c4265ed21a5c465fa685029b66c6b33d9209575a9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Test.docx"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2436
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RarSFX0\Loader.pyw
        2⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Loader.pyw"
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:1996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Loader.pyw

      Filesize

      141KB

      MD5

      59cf70d293bbcc2a8f1030a28ac54dd3

      SHA1

      bb669f50d5d4da198643e22c99c315bb618e2f57

      SHA256

      bef367f5618cfe9d8b54ac57e58520bc1605e80c817400a591a73c9617272de5

      SHA512

      3e3b5a4a556b9184b96bbed57eed463a8715caba01414b265496ab0a49fa29ddbde44b2a1c4ecedeae761498a5669d843ef46621bc6147bc90f7ec12562c83cb

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Test.docx

      Filesize

      11KB

      MD5

      3bf6ec8ac631312c197a549b45741b87

      SHA1

      749bb832bddbfc3ef2ec23851e514ed5dd08e33c

      SHA256

      ae255e10067e4c8285cf4b6d49a3463752bc053fcb14c755c78ea57a55363f8a

      SHA512

      1d1828290c8a7ec91e378ab94fda6d091b066e9d46583907bd29f447ea32524c5033f1620f49d728cc25b014d8bde6007fd2fb6888f028c336c6023af6de749f

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      58d32210b2688036ac5abaadcccb373b

      SHA1

      47c64d95c09a3acedfe007de975c063b99e5b26e

      SHA256

      9762f69725fc7a35f93b32d0250b5a0a7ea2d591b490a7e10222f88640375db5

      SHA512

      c57539c859bb33ab5d884cf7eae1e6d666850e61747ad5675d1ac427865959fc57e7321862cf0bd1474fdd277eb3aeaec829ee963dcdffc8ec8b292d09789a5c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      eace895f498e92ed646410c181b289a0

      SHA1

      34ef5b41fd3d8286c45b274444aac5643e858a0e

      SHA256

      f42d588b33f299262e6cf55cf298e0230ced8b1f317a3ba524a97504803c09c4

      SHA512

      b203c9acd525cd286d10030daf87f741cdf7e9d6b6ac802d71c54d2992e701fdd5b04789899308e4e103ac97f2a8d2d24be4d3423729698641ae935d1c53e74b

    • memory/2776-4-0x000000002F541000-0x000000002F542000-memory.dmp

      Filesize

      4KB

    • memory/2776-5-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2776-6-0x00000000717BD000-0x00000000717C8000-memory.dmp

      Filesize

      44KB

    • memory/2776-16-0x00000000717BD000-0x00000000717C8000-memory.dmp

      Filesize

      44KB

    • memory/2776-34-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB