Analysis

  • max time kernel
    107s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 12:03

General

  • Target

    6d0458827121c7a2e95676419e88b0ed.doc

  • Size

    71KB

  • MD5

    6d0458827121c7a2e95676419e88b0ed

  • SHA1

    226566429e1883faa2e87f1a626c4e12e303e605

  • SHA256

    1faab34dd2c0d326595be53a4c0092c9f7f10fbd8054a54e4d1b0beaf5ab5518

  • SHA512

    7cc042a3a6f59ed20a30ae8b6cd9d7db1b4c6b221daceef6aa41ce1f1514673477e043103be9a5428a208672f8111370272943ee087674441743a64f31186b63

  • SSDEEP

    1536:EYBwk0vEHr11AQYyqGJHQYCDEtU6dLTR97el:dwnv+xQYNtU6Zvel

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6d0458827121c7a2e95676419e88b0ed.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\programdata\compareCompare.hta
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2296
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2816
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\programdata\compareCompare.hta"
      1⤵
      • Modifies Internet Explorer settings
      PID:2044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      87563d7652d55d14f2f52504a3f05088

      SHA1

      64375b569cedbe433d445dc39667a502809644ca

      SHA256

      542cc4f86c757b73b918de202156cde015ea78825742270ec0082dfa515ea7b2

      SHA512

      f883d7b418ad93198b7da9ffa0271b9d8b76c21d4c8e4c14b4600ed37a12b0e8cd5d66cc6ef705b65c502c5f30ff1a826004fc687d9c1c6d8ea697883c58f90b

    • C:\programdata\compareCompare.hta

      Filesize

      3KB

      MD5

      e431d9a1b5519d63b00afd17f294b6bc

      SHA1

      731cea3f8534f16a5adad86e5f9cc2521a07ed1d

      SHA256

      419ac616dd90270cbb2e96400d0dc9922982bf7069fe645cfeee78b07ab7881b

      SHA512

      64eb0786d2afa455a5ace78081a51a30570873d0e1ce7e820a4d58cb0fce1e727f00755c41924ed51e5b964b6dbcd807b3f23d6b03dd32014d0b9588b93909c2

    • memory/756-17-0x00000000050C0000-0x00000000051C0000-memory.dmp

      Filesize

      1024KB

    • memory/756-0-0x000000002F051000-0x000000002F052000-memory.dmp

      Filesize

      4KB

    • memory/756-19-0x00000000050C0000-0x00000000051C0000-memory.dmp

      Filesize

      1024KB

    • memory/756-22-0x00000000050C0000-0x00000000051C0000-memory.dmp

      Filesize

      1024KB

    • memory/756-2-0x0000000071A4D000-0x0000000071A58000-memory.dmp

      Filesize

      44KB

    • memory/756-20-0x00000000050C0000-0x00000000051C0000-memory.dmp

      Filesize

      1024KB

    • memory/756-58-0x0000000071A4D000-0x0000000071A58000-memory.dmp

      Filesize

      44KB

    • memory/756-59-0x00000000050C0000-0x00000000051C0000-memory.dmp

      Filesize

      1024KB

    • memory/756-81-0x0000000071A4D000-0x0000000071A58000-memory.dmp

      Filesize

      44KB

    • memory/756-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/756-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB