Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 16:13

General

  • Target

    a4389b334e80bd96442138b2dd196209.rtf

  • Size

    224KB

  • MD5

    a4389b334e80bd96442138b2dd196209

  • SHA1

    10c1fd3c31c77a7fc99b68d28e541260da50c4ee

  • SHA256

    c3b5503a0a89fd2eae9a77ff92eef69f08d68b963140b0a31721bb4960545e07

  • SHA512

    f3fb03d9e77953bf6d965835086be917f416728f940fc796cd13b05abd61286ce262682057bdb8bb65b112786edeada5f0301b2968e72ce678cdf239ccfc5443

  • SSDEEP

    1536:+r4DOTg8X0t9yOo6SnDsxI2+6VkoZoOfRb9JmkjJydLksx0ChndVXDke/zmCOcmY:+cDh8OMgoIXmCkpF0SjzPmKUqZBZTw2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a4389b334e80bd96442138b2dd196209.rtf"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2964
      • C:\Users\Admin\AppData\Local\..exe
        C:\Users\Admin\AppData\Local\Temp\..\\..exe
        2⤵
        • Executes dropped EXE
        PID:2852
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c reg delete "HKCU\Software\Microsoft\Office\11.0\Word\Resiliency" /F
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKCU\Software\Microsoft\Office\11.0\Word\Resiliency" /F
          3⤵
            PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c reg delete "HKCU\Software\Microsoft\Office\12.0\Word\Resiliency" /F
          2⤵
          • Process spawned unexpected child process
          • Suspicious use of WriteProcessMemory
          PID:324
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCU\Software\Microsoft\Office\12.0\Word\Resiliency" /F
            3⤵
              PID:2644
          • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
            "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a4389b334e80bd96442138b2dd196209.rtf" C:\Users\Admin\AppData\Local\Temp\..\\..doc
            2⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:588
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c reg delete "HKCU\Software\Microsoft\Office\14.0\Word\Resiliency" /F
            2⤵
            • Process spawned unexpected child process
            • Suspicious use of WriteProcessMemory
            PID:532
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKCU\Software\Microsoft\Office\14.0\Word\Resiliency" /F
              3⤵
                PID:1544
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
            1⤵
            • Drops startup file
            PID:2200

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\..doc

            Filesize

            32KB

            MD5

            cbdcda3fd04ae8b3e4a3237dd10f3262

            SHA1

            249c1e0dc4f12a640d30031a561bbfac602253fb

            SHA256

            979939a76f06e773eed18ffe21e76622fd175f3b5afb22e663dbbe61f5dfa1d7

            SHA512

            db7c28c9d49738edef29fd86518ddf2f52702f8adf49a34b33fc77aa8f31467e5e34f45aa348e01bb787e356f5728b0de20592647f9b42f84ad94d3bdfbe004b

          • C:\Users\Admin\AppData\Local\..exe

            Filesize

            128KB

            MD5

            b0fca7f8709eec35d83dde762498e586

            SHA1

            e4561fcb2fe02028c5d0a9e9c82cbd4f0828c1dd

            SHA256

            82f028e147471e6f8c8d283dbfaba3f5629eda458d818e1a4ddb8c9337fc0118

            SHA512

            d348ecfa447b0cdf6431f9e92253807fcad75ccf6ab48d92658b9992f4abf50773144299ddb93c54b80a07507bacbfc6c6c3a44a5ce5dc2e29d84ff2f650e154

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRO0000.doc

            Filesize

            11KB

            MD5

            20544ad79cfceb5ceca82000f42402b2

            SHA1

            21774f5ec4c423b0b43b5a67c685034cba055a77

            SHA256

            2cb2ec03ab707cf12db719e4de178fb05c8d799f54cfae07647e69e8d6a55331

            SHA512

            e2d1652e749b9ee6ea933375a2dbf659c34d5b0aa1216644d1839553c62a129409ef1442272c53bea529d541a62a88621e96926af3bba492fedc6508ecf3d05b

          • C:\Users\Admin\AppData\Local\Temp\a4389b334e80bd96442138b2dd196209.rtf:Zone.Identifier

            Filesize

            26B

            MD5

            fbccf14d504b7b2dbcb5a5bda75bd93b

            SHA1

            d59fc84cdd5217c6cf74785703655f78da6b582b

            SHA256

            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

            SHA512

            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

          • C:\Users\Admin\AppData\Local\Temp\~$389b334e80bd96442138b2dd196209.rtf

            Filesize

            162B

            MD5

            e3c3b656f9f9baf785756a525d062dc1

            SHA1

            f817a7705c6a0c53187aff0b4c66e3daccd719c4

            SHA256

            98a5636710d0b036719f61dcb16fae76ca83e46a9c19f5999e3ef80e17d99abe

            SHA512

            6516322804964779f4045c278dac81b1f6ad09b97474fcf50934e87b1008be7ebf682cf3fff736ce32c5d6450c95fcad32124818bf66ea2e4b4989471d6b9831

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl

            Filesize

            36KB

            MD5

            b054bced0f6091847dedebdd23724e8e

            SHA1

            0d4adae05811a11f1e71ca63e8801856e9ccc3d3

            SHA256

            ea92b46f724bad664809cf67ee2331cdcecb0aa37bc17a542e308fc3a8544c19

            SHA512

            eda19c8a9ee34a90fd9322d45d830e914b46ca1bc6d58ea5ef5a327c70c66df5ea628832dc313a057f94a2ec7a68772135f57ab5e2a4d5e5681a8185a2ec3d42

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            26b86a14ec80cd9d46462bc06359b96b

            SHA1

            f08164e05f53652fcd33590058e3c24b76e53d90

            SHA256

            a5c92d233b60cee3b5fb5d50ac2f1f80a5033f4a9bd3639111c5caad58093ea4

            SHA512

            776e5f5007b9cf92e1e11f4428ad29ae3cc979432271cc742044911cbce8e19f68cda4cb7c28e0630101e7082bc4dffa9f1c9090d5e3a1562049402ff1cb2ae9

          • memory/588-53-0x000000002F351000-0x000000002F352000-memory.dmp

            Filesize

            4KB

          • memory/588-58-0x00000000719AD000-0x00000000719B8000-memory.dmp

            Filesize

            44KB

          • memory/588-79-0x00000000719AD000-0x00000000719B8000-memory.dmp

            Filesize

            44KB

          • memory/588-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2100-50-0x0000000007220000-0x0000000007720000-memory.dmp

            Filesize

            5.0MB

          • memory/2100-0-0x000000002F351000-0x000000002F352000-memory.dmp

            Filesize

            4KB

          • memory/2100-42-0x000000007C38A000-0x000000007C38B000-memory.dmp

            Filesize

            4KB

          • memory/2100-2-0x00000000719AD000-0x00000000719B8000-memory.dmp

            Filesize

            44KB

          • memory/2100-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2100-64-0x00000000719AD000-0x00000000719B8000-memory.dmp

            Filesize

            44KB

          • memory/2100-65-0x0000000007220000-0x0000000007720000-memory.dmp

            Filesize

            5.0MB