Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:17

General

  • Target

    04c83bc002c6f20a34ccc33830b1b626.exe

  • Size

    128KB

  • MD5

    04c83bc002c6f20a34ccc33830b1b626

  • SHA1

    5ab21e5d611bafc7415571e217ba89455f286c22

  • SHA256

    28ff224dc7066bf7b94fdfb33f690ef4b6994492a287fb3d2006dd6b45afa7d9

  • SHA512

    309f30a5dba77a64a8493a917a4f288a48e24e0f7f3de52b17c00a2471de36756435e68420669a211bc006c6ef37a2877e631b14fc5d93fd68d083d148502e5c

  • SSDEEP

    3072:uwR5g46PJhHXuy2uOtXEY/+VQ/qJPqXuaBY:fR2zTIXry+SPyueY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c83bc002c6f20a34ccc33830b1b626.exe
    "C:\Users\Admin\AppData\Local\Temp\04c83bc002c6f20a34ccc33830b1b626.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\3.9ÍíÉÏ.exe
      "C:\Users\Admin\AppData\Local\Temp\3.9ÍíÉÏ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:2292
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ÉîÛÚµç×ÓÆóÒµ1000¼Ò.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ÉîÛÚµç×ÓÆóÒµ1000¼Ò.doc

      Filesize

      100KB

      MD5

      b8a8e4246c7d79b55ec3f1503b8d8547

      SHA1

      c828ff8f785df32b8d7aa7356487ae592a8aaf14

      SHA256

      a6910fdec7c2a1a259c55a3aa9c8555dbb19a65a059e2b19c655ddbd69608751

      SHA512

      99406dd15aa2f26a29e6e15568d1a018d9bb3cb240d225a0c6d04de1dddb88a18e47a605c89f60023dce1b58d1fa07211369eb87aa22e270651c1a20a8d5f0cc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      ed4d7ae791a3205105a627abbe35ce12

      SHA1

      9af977849c519a3e404d46f50d97d748b985812d

      SHA256

      267d03a9cddcafda538f294817166ef49072e8d2c8a080c6533e171682cc0f70

      SHA512

      59594307bc0366a625eeea09d58cbc506028dab52a68adb747cae24bbe22f33ddddb4b116efad577c106aa810458d40adb27ccf51346e152d8f73ee4e1b721dd

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \Users\Admin\AppData\Local\Temp\3.9ÍíÉÏ.exe

      Filesize

      61KB

      MD5

      6fe327c78a2abd19ed82b4533bd01e06

      SHA1

      ba0f4092deb4749cb7fe50107b6e0c627760c949

      SHA256

      6514e8887f73419caa542f3e8b1fac63cd3692dd45dffafa0290b7fc97adb823

      SHA512

      efe85a464e7ab22238514202403984146a663cdb38c4e6e89e4cf3780df65f64e87e34ada376d7be870b09280e7b29f31d2fbffb1638ad8f7146222575dc0fbc

    • \Windows\SysWOW64\ttfwkn.fsl

      Filesize

      94KB

      MD5

      787e96c83f5581d2c8d4769f192a482d

      SHA1

      b149b01f8e8f2c4e954edebed28356b907a6bcd9

      SHA256

      1ed3c6693fa931c5f4c18c0ec8d2c6a90e6ee54c7ad396d3c7282454dc0cbe71

      SHA512

      37c83201800912114ad870b27620ed189b7309b88c70407b3e6706d46922e3ad1ad20d4ddd0f303e7caca60cc95b06587bcbc95d2e8ce3bb0e6f0d412f890d23

    • memory/2692-18-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2692-19-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB

    • memory/2692-28-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB

    • memory/2692-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2692-55-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB