Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 17:13

General

  • Target

    Renderware 3.7 SDK (For Windows) Full/Exporters/3dsmax3RW3.1exporter/art/Example2/morphtarg.doc

  • Size

    48KB

  • MD5

    e789ef778673fe29ea7e71d6aab9ff8d

  • SHA1

    f3c89d85692bf359513efc7207a479ba0c10d3c9

  • SHA256

    869a7a1669a208eaeee2c94126c63d2754304074132224d9c6989444f9129477

  • SHA512

    59761338a2d88a6a14a7e683f37b9897e963ade1721dca217bccc303f5e17d52fe0827d3dd9def630295254f835ee94bd9ff0b217153ae6a380dea1bb655cb2e

  • SSDEEP

    768:bWR/z+YSd0L7q11nHjq5k4MQHbkX1iMU1LoZLdDzWC0a8P4S3t9So+QnZi:KR/zweqnDq5/1bg16Lax/Eaudg

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Renderware 3.7 SDK (For Windows) Full\Exporters\3dsmax3RW3.1exporter\art\Example2\morphtarg.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      35c2f4bcd821e131752072939ad996d7

      SHA1

      f90e26d43a45fa3f63297c8d75ab98bc554221be

      SHA256

      fbde5d4a9812cc118a62b825f13abb1a1c508743f548482f764e3cad182b91c5

      SHA512

      8b24af9fbef3e2ada2b22f6ed608d22f81163c533c4faccafc8b2cc5f6558a08f1cfe5069d1a511063c967fe68552459a191cddab980f7434baed0e088c8f1d1

    • memory/1740-0-0x000000002F8B1000-0x000000002F8B2000-memory.dmp

      Filesize

      4KB

    • memory/1740-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1740-2-0x00000000711AD000-0x00000000711B8000-memory.dmp

      Filesize

      44KB

    • memory/1740-11-0x00000000711AD000-0x00000000711B8000-memory.dmp

      Filesize

      44KB

    • memory/1740-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1740-27-0x00000000711AD000-0x00000000711B8000-memory.dmp

      Filesize

      44KB