Resubmissions

24-02-2024 16:45

240224-t9jsjsgg37 5

Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 16:45

General

  • Target

    License.rtf

  • Size

    37KB

  • MD5

    036d8d2f27dd5e8e17bf19777f164336

  • SHA1

    c4e71c657cd42da488229cfd7bbdc7b32a4f761d

  • SHA256

    aabc4c74bcca47366b23d85231fac74487ca6daa343be6e370de54d2d87223ea

  • SHA512

    cd34cbb35f8deb6b893d3cd8ce91bbaed40c374d3e866803017ff586c6db8e98db351ef524caf6a12252f1fd71363b7cc0eeb8ddfb8ff87188817c2b7251bed9

  • SSDEEP

    384:z1iPoHYy11FKw0zybDEFKj0Ch1ol//Pb3O0+3eo75Y3kmA31dv61Qys:z1iP2Rj0CQLZrS14A

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\License.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      3706e75a99e096d51db4e04ce50be8bc

      SHA1

      c1dedbe2a710eebda422d065063d45cab8b740da

      SHA256

      75bc13f99bc61b5ed25ef05be4d3ef80a1ae939fa1f21789e0faad21df3439d3

      SHA512

      19a38adb615dea87425c201c270f8f9e2250e3abfbcae5db43795e146b8a73f0a1979583c8bbb3472e3226a52b17b9a05dd271ab7e2f423181505b2dfc3425d7

    • memory/3020-0-0x000000002FCA1000-0x000000002FCA2000-memory.dmp

      Filesize

      4KB

    • memory/3020-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3020-2-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB

    • memory/3020-11-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB

    • memory/3020-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3020-30-0x0000000070E3D000-0x0000000070E48000-memory.dmp

      Filesize

      44KB