Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 18:30

General

  • Target

    $PLUGINSDIR/License_DE.rtf

  • Size

    7KB

  • MD5

    858d50016b5091a71bde743798e4fde9

  • SHA1

    80fe9815569fab908af407db0b0c386ee5fb0499

  • SHA256

    0d121347542face1889918432c70ce29e0fed3f53a837c9d03c9a73f49ccc834

  • SHA512

    2fa1080a2d667629fe2862075855b6ae1c6b4e592fc2e119f2775fb1ede100cbe9efd5252241b6ee4eddf8925d99e1751f06c0c3f0ad2290f489e0caaac7fce2

  • SSDEEP

    192:YfMZT9jNvNThXsR00Ao2dyTSWOrrgSRfM6+QxFHYidArvNK3pCnLPeWVRX2:X9jxBhXsR00odI1j6Hb8vg3pCLP1VRX2

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\License_DE.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2592

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            2e9cdf6d755a6fce34d690afa31a6eba

            SHA1

            77e09c86967d17ccac22d1cc018dc4e4aa17d72b

            SHA256

            647074b72035852cc76032e3436384f20dda68b5e58cdc1d89e18d3848cdb5ea

            SHA512

            cc1cd25bc1127b75d9f1ffe709ec9d86d9affe5f96d0754f504a14992ffec6c0a2f0f583b66929da118f7a3c8e73b7611d198e4d78a60058e398028f5abe6f28

          • memory/3024-0-0x000000002F6A1000-0x000000002F6A2000-memory.dmp

            Filesize

            4KB

          • memory/3024-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3024-2-0x00000000716AD000-0x00000000716B8000-memory.dmp

            Filesize

            44KB

          • memory/3024-11-0x00000000716AD000-0x00000000716B8000-memory.dmp

            Filesize

            44KB

          • memory/3024-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB