Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 13:59

General

  • Target

    $PLUGINSDIR/license_Conduit.rtf

  • Size

    113KB

  • MD5

    80de64eaa4989a88202ff1135d68c82f

  • SHA1

    bc518cec719d697e6f3872818618399f97c0aeea

  • SHA256

    f6c79a79fbe3d283823acca2f6c5ad27b327e9513c1a755379cb83bd8e4640b0

  • SHA512

    66199a54a63a5a2dd78f265282330eb45d8201a111c6d6c748df1228dd36450f0f4b06f7a3705a8d29190f63bcce549624ca1fde2d0d072fd97d43697494bb75

  • SSDEEP

    768:owIE3e7PDOcomh+LeRooIniyDTcvcBCNEeeJcOerjj1oxamIYKRXOYjI7csb5ftF:oFAHLFiGSGOGFx7RstDf0Yyn

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\license_Conduit.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      dfe2053eaf26afee5a35210b826a6ed9

      SHA1

      9ee6ffb82eb81c9ad0981789bb674db2f919b67a

      SHA256

      21f707f520455c90bf0434a2ea9357f4c5d11c72c054c58b07e7057e511209ed

      SHA512

      95f9a524ebe0238637c73ed6557e2604b0b7a4a1f67376b2571bebbb4ba8bdaa39e6089c80669f44379938c1fc20b624679b7de6942bb680bedaf692aa842667

    • memory/2524-0-0x000000002F761000-0x000000002F762000-memory.dmp

      Filesize

      4KB

    • memory/2524-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2524-2-0x00000000714AD000-0x00000000714B8000-memory.dmp

      Filesize

      44KB

    • memory/2524-11-0x00000000714AD000-0x00000000714B8000-memory.dmp

      Filesize

      44KB

    • memory/2524-32-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB