Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:03

General

  • Target

    e6387351bb3c31c0676e61ae939f72d5.exe

  • Size

    36KB

  • MD5

    e6387351bb3c31c0676e61ae939f72d5

  • SHA1

    b3c387dadccf74238e213fbb46e160c925545ded

  • SHA256

    9a2ff0ef242f0d2813ffa58e856c0bd6ff7299c0987319807a2dc89ab031b773

  • SHA512

    83fbff63a56e32cbdc44b17229d03ccfc4ce838c4e6b6373a92c71a58b979aca9246c35db9796835f9ee86484eb899e7be06da38dc5a305167809dcc3b1571d3

  • SSDEEP

    768:GscqOnoowvctKnJEEAC+e+fOhvpfUAU9xS:GBqywhnJEEAr6vpsAUDS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6387351bb3c31c0676e61ae939f72d5.exe
    "C:\Users\Admin\AppData\Local\Temp\e6387351bb3c31c0676e61ae939f72d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e6387351bb3c31c0676e61ae939f72d5.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2632

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\e6387351bb3c31c0676e61ae939f72d5.rtf

      Filesize

      4KB

      MD5

      cce1ee2eca38ec5cca3a1dc883ca815e

      SHA1

      447b3209541feb29aef0e8150367f1e9d4777ed5

      SHA256

      d44903105c844b08ebe0822d97c64fb70e7da14fb327ae3a2cad4059d4e10d98

      SHA512

      514b4bce268ddc79696334fae0dc642a97c2582b80648c1ffcd347beed2c70789f7f690eab8c4ed1398492bd1d8edf3e46cff38e22340130fc52d76943583acd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0ece8fb25e5a293e343a136ea59f2d46

      SHA1

      0038288bae53a106257b7c22b4b80aba892b4007

      SHA256

      4fc941063340b4b38befef6d032a8ec4cae8d6754e9bb733e5d448723ef5ed57

      SHA512

      960714c937161148f976a236aac6a8443d82838a011bdab5b4bc78cabcfc7c495287d05aba10c7016814b8cbc3582c95789867ac5e0ff7ec05256f2ad4a3604a

    • memory/2104-3-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2104-2-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2104-0-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2648-7-0x000000002FE91000-0x000000002FE92000-memory.dmp

      Filesize

      4KB

    • memory/2648-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2648-9-0x0000000070D5D000-0x0000000070D68000-memory.dmp

      Filesize

      44KB

    • memory/2648-21-0x0000000070D5D000-0x0000000070D68000-memory.dmp

      Filesize

      44KB

    • memory/2648-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB