Analysis

  • max time kernel
    30s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 20:03

Errors

Reason
Machine shutdown

General

  • Target

    Documento sin título.docx

  • Size

    5KB

  • MD5

    7ccaef5c8dfa755a75606ddcfc0e862f

  • SHA1

    669c32f7f332ccd15848c6cab418e70693a3648e

  • SHA256

    6fc69b83f5039166e3081ce21a133050236af5da108b3057700b4f096acce9ac

  • SHA512

    fbc01b2756005e8032decbbca24a80234dfe94b444375ebb115a8c3c76b25ddfc576c4900d0e1ff8f9b9b6d1e72f0623ace1a4c619f0b45e8ef1802f83512d68

  • SSDEEP

    96:MxMpwP5dzjAT5+csQB4gsuX3rUHtTLSQojKRnbaQPWnIwa0G5Zc7+1yRt4PRSk:uGIzjs+Ti4grX3wHVLJGg8xFc67+1yRG

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Documento sin título.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1696
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2772
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        09cf086de4d70fa6cff2b219ae787bb4

        SHA1

        ac1f8f2cc2f7965048a11caa9dcda34e361afbc1

        SHA256

        fd6d06ff80ad870c9eb56e5a8e260f0122e199b18cb68dbc83c7419ee59ffc29

        SHA512

        d1340effceaea25ebd73cc0b4d2a9e2d53e45c8aee5aa96149354c24476046a44e353119f8de410dba7a67d810cb39d13af9baf1f84027cfdffba36547c43de3

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryES040a.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/1596-40-0x0000000002B30000-0x0000000002B31000-memory.dmp

        Filesize

        4KB

      • memory/1696-0-0x000000002F7A1000-0x000000002F7A2000-memory.dmp

        Filesize

        4KB

      • memory/1696-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1696-2-0x0000000070D4D000-0x0000000070D58000-memory.dmp

        Filesize

        44KB

      • memory/1696-37-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1696-38-0x0000000070D4D000-0x0000000070D58000-memory.dmp

        Filesize

        44KB

      • memory/2772-39-0x0000000002E90000-0x0000000002E91000-memory.dmp

        Filesize

        4KB