Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 16:23

General

  • Target

    FaxBldg.doc

  • Size

    46KB

  • MD5

    9d4e8a9fede2690073f2f3a807bcd392

  • SHA1

    3544e622567fe882759cba8518dde02e334e8ebd

  • SHA256

    598b98bf44c051b4517112c418c5b77defdbf18851bec4ca55cb3bf45865dedf

  • SHA512

    509c930ab640d6884a8db12976cb3f576175339a699b7cd596de77c814b8afbac2267305ba10c2e182c65318b5cea40fc58dec5ab61385cd24af2b92c058c34e

  • SSDEEP

    768:rryX2m0iVSHt3WXbj4nVzG2y2ZiW3yI2tkuJ:rryXFj4nVAuyI2tk

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FaxBldg.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2144-0-0x000000002FC41000-0x000000002FC42000-memory.dmp

      Filesize

      4KB

    • memory/2144-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2144-2-0x000000007193D000-0x0000000071948000-memory.dmp

      Filesize

      44KB

    • memory/2144-20-0x000000007193D000-0x0000000071948000-memory.dmp

      Filesize

      44KB