Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:21

General

  • Target

    1cd39f8ba7cc97e9c824ea04148b68f3.doc

  • Size

    13KB

  • MD5

    1cd39f8ba7cc97e9c824ea04148b68f3

  • SHA1

    38dbb325357c0fa3c41f388d726c436e1d9f216f

  • SHA256

    7863a9f35f8cf7d7d22fedcfb65a8a2aa52129ed1883cbac52077eac5c4133e0

  • SHA512

    03bb6883fad44a41f68c0f996cd74824939171520dc944ccb4398f366f4cd3610763f7024d55b05d1b44939e4b3570c53454162c2de0073d87bdb4d5c0a02d74

  • SSDEEP

    96:D1QGjiuuZrzQ2DhxRke099+I5WHj5SKKlLuipAfjXlq:BA2yMKKl68Yjlq

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1cd39f8ba7cc97e9c824ea04148b68f3.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2684

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            21758ee7a80769bb039d115f0016062b

            SHA1

            3b2d0c5e210284f48cbbfd6cbe4509279143247b

            SHA256

            6502b87b16b6bb15a026145b2ba70ea0e6224f4d4be8cff4bcff999c59d0f220

            SHA512

            cd17c1cfcec11291952f5e2f53eecae5e7985dd01cbd14ff608de7f963114a9d4dc32ecc15898453a68d3d9fa59a396d9af627a473b194ae06623e80c45c1397

          • memory/2968-0-0x000000002FBF1000-0x000000002FBF2000-memory.dmp

            Filesize

            4KB

          • memory/2968-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2968-2-0x0000000070C6D000-0x0000000070C78000-memory.dmp

            Filesize

            44KB

          • memory/2968-11-0x0000000070C6D000-0x0000000070C78000-memory.dmp

            Filesize

            44KB

          • memory/2968-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB