Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:41

General

  • Target

    6f4c91856c87eae9082ae952728ad17d.doc

  • Size

    10KB

  • MD5

    6f4c91856c87eae9082ae952728ad17d

  • SHA1

    4bb2e308fcd14006f878f4c2af1e21bc28036769

  • SHA256

    0a20f157dbc015c9f69cdcaa8f270f1d982637a6298997a8b75bed7d9ee79efa

  • SHA512

    0eee004c21d9a5ebb217fa4cddc3968b02fa09f86c7126e16f5c3f0f7f0cfe1f12f63ec620c646de1ae63cf6ad5df4b9baac50213e23b366397d7e49e6757148

  • SSDEEP

    96:Mjhd0141k1p1UUpEO9PS2pM0rELAhSfYxht/3xvA+dAPkGgs8im9G3W3cOl:A0UYff+OhS2pThVtXv/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6f4c91856c87eae9082ae952728ad17d.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2820

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\VB339F.tmp

            Filesize

            4KB

            MD5

            27d7e9a5fcbb0fbe3b922c410149a217

            SHA1

            a6ae146cbc5e53cb6d05053f3f8d0f5c8165ee1b

            SHA256

            88e91cf0212c1f047fc7c75ec9ba9b84366d349d94b69276c57bd8e44a4f46ac

            SHA512

            af5d97d2c7fd97531905264372d3a333bc67de3930898318bdc43c0f4f7de2d1c59da392ad40a5f1abbff5d7bd9fc1ee2aaca64fda87a2c5bed4a74a6883ad8b

          • C:\Users\Admin\AppData\Local\Temp\VB33A5.tmp

            Filesize

            1KB

            MD5

            69af098e01da3fb2fb048405a5c51f16

            SHA1

            46441115997e5745c2531a3983bd0d8ad78ec5ad

            SHA256

            149a49b3b0d7784c6f0deade636b623e3ecb885dddc1bfd6f30dd12309742474

            SHA512

            c5a8518b066d0f6b01d9bcce36f58d3099b1db3639dc553710c168af49370b7aaabd3c88b77ad24897570b2a70c6a37a0feb671e05463016ae138d28e105f2ba

          • C:\Users\Admin\AppData\Local\Temp\VB33B8.tmp

            Filesize

            1KB

            MD5

            beac1626f80cecc487d43d214ce0900c

            SHA1

            ce9ccf71fd62cb66d21ef52cbde3b1b295be90ef

            SHA256

            a4f8fef8c4aa0072c357afeaf0767e00b14acd83030f2ae6c38ff525c89b6575

            SHA512

            7a21dbe0580f50f36d0084294cc89ff543edda9c2703f318c6381acb7a8f9eae7a4f494840cd78b4d47d3ee56698ee4b9d968f316fb09f7f2cfb37c77b5fa9ea

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            33KB

            MD5

            2c9fefee1aaf29983ac5a89060f6410a

            SHA1

            7f03ec922acf372a0fc7ebd2ff6dbc69c6b7b4f8

            SHA256

            24626211c57250994c4c82a4f6eae03255ca8b5c4a02298830b056513e9d29ed

            SHA512

            2e960d0885bba0b89bfb67434bbb1b8c5af5a6ad2efb6de55707de0b03773249c81dd30fae12584dd23851503dc9885385850a70169875acd5bb3cf06cb94d1a

          • memory/2352-0-0x000000002F6D1000-0x000000002F6D2000-memory.dmp

            Filesize

            4KB

          • memory/2352-2-0x000000007130D000-0x0000000071318000-memory.dmp

            Filesize

            44KB

          • memory/2352-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2352-16-0x0000000004F60000-0x0000000005060000-memory.dmp

            Filesize

            1024KB

          • memory/2352-49-0x000000007130D000-0x0000000071318000-memory.dmp

            Filesize

            44KB

          • memory/2352-50-0x0000000004F60000-0x0000000005060000-memory.dmp

            Filesize

            1024KB

          • memory/2352-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB