Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 02:21

General

  • Target

    2c58ca41949aa784dce6a2006162781fe7a7a5453cafb731ee4d512efe718c43.rtf

  • Size

    78KB

  • MD5

    561ed5405267a715e9dcfea42b63f37e

  • SHA1

    676b6196a706316bf3e311c58fd0ef991efc41a9

  • SHA256

    2c58ca41949aa784dce6a2006162781fe7a7a5453cafb731ee4d512efe718c43

  • SHA512

    c746e89a41fc61077eef5ae0d7216d6d875c5cc94a53de20cfe61421aad781a2b71e668a94d8acbedab4542c488aed83753d472627033310681e7a03d9f3f986

  • SSDEEP

    1536:BIUc7oaRRN+VvmfiKibp4/kcgHPSgM4ALoCXWytFwMQuK1WP:XcKVvmfiK4S8cgHKgM4ALoCXltJK1C

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2c58ca41949aa784dce6a2006162781fe7a7a5453cafb731ee4d512efe718c43.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2752
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\ilovemylovertodo.vbs"
        2⤵
        • Blocklisted process makes network request
        PID:2552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      41a9b45d7e4057ab48c51ef0d44c31ae

      SHA1

      be9294b43249e2f46ab661fa1aed5f5520db14cd

      SHA256

      abf80be52a868cfcf6ed4a25be26ad65bf9f104ff580917b81b9f8046c8f7f09

      SHA512

      4ac102b7e15281e830eebd9186c287cdc84bd1bfaa9926e3f6f6c32d891ac988953f89987c21fe570c1e282b0389c995e9c87004f02526335d798ed29f43fc8b

    • C:\Users\Admin\AppData\Roaming\ilovemylovertodo.vbs

      Filesize

      3KB

      MD5

      8ff19f01ae1f823ecac26a862e03fe06

      SHA1

      4cc829909aece8d6880f47ff1e732b7df229ca4a

      SHA256

      ee63a39ce35d10f281aaf408229aa1985fce89cf8a4f71814f08e0832ee54357

      SHA512

      fef140775d487b70c97ce6fa7812da0f2c13f7c217f6d7c235f4a046fc12fe854b5f060bb0cbcc96c7df1d9920d8ace852b3a51f0f4fdf96d563518711b63b04

    • memory/2240-0-0x000000002F401000-0x000000002F402000-memory.dmp

      Filesize

      4KB

    • memory/2240-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2240-2-0x0000000070D8D000-0x0000000070D98000-memory.dmp

      Filesize

      44KB

    • memory/2240-33-0x0000000070D8D000-0x0000000070D98000-memory.dmp

      Filesize

      44KB

    • memory/2240-51-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB