Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 13:34

General

  • Target

    VirusShare_454442ba76755fb40b25551d352574ee.exe

  • Size

    38KB

  • MD5

    454442ba76755fb40b25551d352574ee

  • SHA1

    d4be4617c063c3ea0928b687f2ba9ebbcf743d9f

  • SHA256

    3a101185d6dfae71e84fb1c37bcd07da18d34b084ab6837d1c49f1bd99642bcc

  • SHA512

    4b64d5b3e6f8cd91746238282cc9e07e775bb772a289500f766debb04a191cc2fe5f9f6e02012fb02a42accdb4aae75eebffdbc8e80d08b6a03c9afaf52ebc34

  • SSDEEP

    384:uivFsccfFOTccJcmubxpQp6X+uZvuUSk+e+zcZZqWPR86pf0ZAY99xSR:HscqOaZ0E5Sk+e+aZFvpfUAU9xS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_454442ba76755fb40b25551d352574ee.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_454442ba76755fb40b25551d352574ee.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\VirusShare_454442ba76755fb40b25551d352574ee.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2628

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\VirusShare_454442ba76755fb40b25551d352574ee.rtf

            Filesize

            4KB

            MD5

            cce1ee2eca38ec5cca3a1dc883ca815e

            SHA1

            447b3209541feb29aef0e8150367f1e9d4777ed5

            SHA256

            d44903105c844b08ebe0822d97c64fb70e7da14fb327ae3a2cad4059d4e10d98

            SHA512

            514b4bce268ddc79696334fae0dc642a97c2582b80648c1ffcd347beed2c70789f7f690eab8c4ed1398492bd1d8edf3e46cff38e22340130fc52d76943583acd

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            f86646ac5a454af67a286f502113d790

            SHA1

            b1207d321f33a61ba4c4d5d5c9111dded3b39c33

            SHA256

            4521ee950798efba7aac8291ff02ff53243fa9a79c0749ffb05e61992d9fed73

            SHA512

            d4d3261d5e6e65e32eb5334204cb069d7c6af11ff54fcab88db291a332cec3c68635a105d06f980a0d2ce48b19687e6095e025d2ea5ba0460eb1220454866bf1

          • memory/2928-1-0x0000000000260000-0x0000000000261000-memory.dmp

            Filesize

            4KB

          • memory/2928-2-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3052-6-0x000000002FCE1000-0x000000002FCE2000-memory.dmp

            Filesize

            4KB

          • memory/3052-7-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3052-8-0x000000007138D000-0x0000000071398000-memory.dmp

            Filesize

            44KB

          • memory/3052-20-0x000000007138D000-0x0000000071398000-memory.dmp

            Filesize

            44KB

          • memory/3052-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB