Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 12:47

General

  • Target

    abe9867754d778417877ecc2f653fb99.doc

  • Size

    61KB

  • MD5

    abe9867754d778417877ecc2f653fb99

  • SHA1

    5f5dc651146c6f4817cdbf67ad2369c4b47de727

  • SHA256

    3635e049c9bea0447244ac9eb48393249940d200f27e866e7ef261f2dad7d997

  • SHA512

    0640a4ee7588f417077c696f6058be6cf90e1f4135cdef79d0500f66983b2af4fc169d864aa308e6ddf43ee67f3d9d468fb0beb54b33cb0b3bc9d270e30be000

  • SSDEEP

    768:0LYqOmpDtH80ihaa4F20GaJX1iz2qv5UQn5:gpy54EaJKxUQn5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\abe9867754d778417877ecc2f653fb99.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\VB1B01.tmp

      Filesize

      6KB

      MD5

      082f090a794781b0ab256ccef65c3b42

      SHA1

      48344690e746076da466833ae93265796b2052e5

      SHA256

      e28ccab4c3b2e93519b21c33460caee19905caa9c8baa2453a02ae134359efaa

      SHA512

      5ca781434e70c9a954e5cce97f363253e6509b605b6c9cb0e905c3f2245dd89efa7963e9dd4b749c78bd58a42164e73e8082168f8a3654f80fb856ec7772023e

    • C:\Users\Admin\AppData\Local\Temp\abe9867754d778417877ecc2f653fb99.doc

      Filesize

      72KB

      MD5

      a86ecbe84e161add37cbe1ba6667ff8c

      SHA1

      fde4ff17014a13f1641c4118fb6489597e4ccb26

      SHA256

      fe049104afc30ebfe8106198c09d2ddfb4c18220b46686b84bc5da560db93ea4

      SHA512

      bfd6e8e3d5a3b764d3857fa2cd118ac19276e85a76a814b69426a4b3ef2293a2ed73318157877121627181707edb260bf27fee727067cabb2a0cf51a41085cd3

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      128B

      MD5

      deb51c633acbba8294b2d13ea2dc907a

      SHA1

      c369f0b657b52594605a241a376f03b2bef524d2

      SHA256

      be514b35d95114acd999c162df99cac2557363e0eafdc976c158470fa93a1966

      SHA512

      4abc8c90e0765c0fcd8bebb5c1c03635998cf439e145ea936c8b0922b25ef4c8b054678cd7620c8f56aa6335d472560a088c18bc69a507d680336c09e072bb2b

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      140B

      MD5

      139e6b7aa5b946ab7fb41daf763c57c9

      SHA1

      0693c71c89b2ff2a814c019e8bed8ffc6589df78

      SHA256

      eda7191e8f34b95d84424d20fe22e7500c89d8fc27a5bf930c194b106b9d6a97

      SHA512

      96259dc572cb150dd06f11dc6547ef82d28c7167588bd035f0d6904ef56c95156f0dac1f34274bbae98cfc288facabcb1fc16d0bf213e8cc84e6d31173ef43d2

    • memory/2876-31-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-10-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-20-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-21-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-22-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-23-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-19-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-18-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-17-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-16-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-24-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-14-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-13-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-12-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-28-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-9-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-8-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-7-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-15-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-0-0x000000002F5B1000-0x000000002F5B2000-memory.dmp

      Filesize

      4KB

    • memory/2876-58-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-41-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-40-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-46-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-55-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-26-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-59-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-66-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-60-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-77-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-11-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-6-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-2-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/2876-147-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/2876-148-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-154-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-179-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2876-216-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/2876-217-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB