Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 13:54

General

  • Target

    UploadFiles/indentAttFile/2011010414458441.doc

  • Size

    69KB

  • MD5

    d59c40cb0d61775131806c246a9fddf7

  • SHA1

    eef6a74ff26fce4ea6aaf89f0e6f8088d0bb8b06

  • SHA256

    2906184d642ef37fb2f7a26cd63fa9549788f57d0b9449781b8095fa0c2c3cce

  • SHA512

    a939a574edb6fb53c45b17178a4d89d5071ee6b2c3cf111f2a80f50a2ef0ece378f639f685da77d3948891c1424d88346e482136bd5bedfaff04097945fb5e75

  • SSDEEP

    384:wL0ohCL+YkTAyHjTkgDXKvTyAjoLkOVh6ffRUDLaUlBfLuQBbxnUAFYo7aAyIyvy:ZoS9kTL8ZYXF4vK/XKqjdYOs5n

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\UploadFiles\indentAttFile\2011010414458441.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AF9AE21C.wmf

      Filesize

      272B

      MD5

      3dcdb004fdccbb65aa2911d9ba2da3a3

      SHA1

      c77644ebb7ec7c5ebb72e2fb9070a8704a863001

      SHA256

      124142fd5b1f28284c52cb1ae5069b8a9c19584a77598e287dbc1829c6b840d0

      SHA512

      51745d4f3ebe11222a1b8a87f9781f4848283e836c7bf3d5b352fbdd8b6d442602beec66adaacfcc71765b9980f83da43a7356f562bbd9c90c131be5d1c1e087

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d169aef9a5121fb8ca8080ff81695a96

      SHA1

      a95186023514635478d1d14caebb9ed5f0ce77a4

      SHA256

      67194a2bd65fb2b8d20188991681a2d09a9f87bc545756177648f9e215392a1c

      SHA512

      d138b7aafb63ae5b6c73e175655f71174f56cedab9691c60319b7ea12d2f626a4c81a2e2ae6355199b099211b9cfb732bebaa065bb44aebd15c864957bc43835

    • memory/1152-0-0x000000002FE91000-0x000000002FE92000-memory.dmp

      Filesize

      4KB

    • memory/1152-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1152-2-0x0000000070A9D000-0x0000000070AA8000-memory.dmp

      Filesize

      44KB

    • memory/1152-48-0x0000000070A9D000-0x0000000070AA8000-memory.dmp

      Filesize

      44KB

    • memory/1152-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB