Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 19:36

General

  • Target

    $PLUGINSDIR/iminentv2_terms.rtf

  • Size

    800B

  • MD5

    2fd8489135921dc79488469a04b42712

  • SHA1

    20c4353f127ceda5dad271c0a3d7d635d0e5e046

  • SHA256

    2485db4ce5b1c6742c5eff015dda69a961b45f0540f99c2d27e3da20d15f6a69

  • SHA512

    2c5d953753961a63ff4dc205a9fffbe0df38a325d40c55fc695cfa12ca204f34165ed8a10c7a83242451c0ff6d1aa062bad6953d67a8652bdb94ccc48e746b4d

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\iminentv2_terms.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4f5b9986892915d13a49ca1ee3a4d5d0

      SHA1

      b10b34fc7bae15b2a96763ffda8f35a925200d63

      SHA256

      ded20148480d3330ac9b659b6ff3f64f93d03984685b6891174b1d1daf8ed3e6

      SHA512

      5be00a0abfb276bea0c3b81d11f9812b9b540dfdce50a1f812d853367d9b7c958fb2887f8057afaf68cd3040207dc8324098449eed42c395b01b1ce411073c72

    • memory/2128-0-0x000000002F871000-0x000000002F872000-memory.dmp

      Filesize

      4KB

    • memory/2128-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2128-2-0x000000007195D000-0x0000000071968000-memory.dmp

      Filesize

      44KB

    • memory/2128-11-0x000000007195D000-0x0000000071968000-memory.dmp

      Filesize

      44KB

    • memory/2128-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB