Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 13:43

General

  • Target

    1a662e21508d4974c1ad27ffadfa7de2.doc

  • Size

    42KB

  • MD5

    1a662e21508d4974c1ad27ffadfa7de2

  • SHA1

    6502b01ac08773d990a1acad230279828bc40c63

  • SHA256

    d9b338b10f7cdc254696d2faa62f803da8f62fe739f6a5ff0d54d6915b730257

  • SHA512

    6c017b1d31656f1d920d7a200fb6444687b626325f0ee3b6af270c0299084ed2687a23f0e78b7a20209a0adf5530f23eee5879afbc06f2dc4f1ace6e15c96e3d

  • SSDEEP

    384:6orm/kM8FQ57i2TvP6A6Sz5uDzCLLyM1X6udh2KP5uQGo:HgvP6A60yeLmfK2KP5uQG

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1a662e21508d4974c1ad27ffadfa7de2.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2628

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1a662e21508d4974c1ad27ffadfa7de2.doc

            Filesize

            50KB

            MD5

            4ddfb978bcba7a45bb8b33b3c00b614d

            SHA1

            99ee9d1848472973d0b1c8e607819c28af59ded0

            SHA256

            249e8a141f4d9ade39b1effcea208cad037ea25302c7ef6696e5db59eca85704

            SHA512

            8fa3156bc8e5f405ef76c627c78babbfbd1b39f5d94bdffbfff17cd560afde69c073487fba5f57fec1191cbcdeed95a2cd9705594c900132fa3eeb9586e0da56

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            24KB

            MD5

            ff8008542d937702ab14a27b8b924a0e

            SHA1

            0191842ac48353bb66ddc629235fbfade6414dbe

            SHA256

            7b33e3fe99caaddba644adbdd51f66a0b58003386432637f9f5be1870f9ff6a4

            SHA512

            9c206998d1a17b51ccc28b1cbc86e3d176f110bc961314372d7c4b595ab445c16898e21051567db2076ab055883d50d17f0a77d2bfdf7507e91dc1490585ffcd

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            24KB

            MD5

            4da54c882584b58457779179264784ec

            SHA1

            67d7cde6b7c7985fb15ded80b32667a1004ba1d1

            SHA256

            561b9137ac17eb0b2b2d249641266fb1b215227b540353fab44a1ba6a5149d19

            SHA512

            f2e2444a2f0b905def7a371896ac937e27e5dda7b3ce1d4e5ac9fd41d893acc841223b7d0a4f56095ea64bef42d33ab7afb1a5b78039637d828fcb54feb4f6b8

          • memory/2848-0-0x000000002FED1000-0x000000002FED2000-memory.dmp

            Filesize

            4KB

          • memory/2848-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2848-2-0x0000000070EDD000-0x0000000070EE8000-memory.dmp

            Filesize

            44KB

          • memory/2848-7-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2848-30-0x0000000070EDD000-0x0000000070EE8000-memory.dmp

            Filesize

            44KB

          • memory/2848-31-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2848-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB