Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 12:41

General

  • Target

    2f7d87be0e2579aa1960e5ed6a023f70796f9127e284eae7f16bd5c4a7d928c6.doc

  • Size

    2.9MB

  • MD5

    efdbbfe02ca2f43dd97e7143b6a28e8d

  • SHA1

    4142d3e9bc6444a3a1c918ca9533a8239551ae93

  • SHA256

    2f7d87be0e2579aa1960e5ed6a023f70796f9127e284eae7f16bd5c4a7d928c6

  • SHA512

    910a415b7cdfe0daf9bfb96dd22a36ea9e38181e6df3bee2be6ae1b17ddaf9eac9466df0402b8321b948132851ad4b210135aadd24c78e1489f921842e89406c

  • SSDEEP

    24576:OLALnmLg6fop+IKKSqWbBwHvmMjNvyoqR7s3r+KKwVQcS+3FUD84zvgxybLw2UUU:zmLg6gp+IaqWF3FwVh3FsW

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2f7d87be0e2579aa1960e5ed6a023f70796f9127e284eae7f16bd5c4a7d928c6.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      25119d6cca7c5106d46a652d4e28f7ca

      SHA1

      615a01ca0d0ca0e23db6cbbb07b2d4c5e2e01113

      SHA256

      d1cf4ac8b018dddbfbc5d18a8695cb0f825683d5f3f7054e5c2b281dcc058723

      SHA512

      059f81ad0eeabd515f89655ef822bbcd46be35098d65f2aa68cab1235881dfda36671569a95c03234dc7ce775667c49590e9c1052b7b8d96a6114ff13d505f82

    • memory/2500-0-0x000000002F5B1000-0x000000002F5B2000-memory.dmp

      Filesize

      4KB

    • memory/2500-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2500-2-0x0000000070EAD000-0x0000000070EB8000-memory.dmp

      Filesize

      44KB

    • memory/2500-11-0x0000000070EAD000-0x0000000070EB8000-memory.dmp

      Filesize

      44KB

    • memory/2500-13-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2500-14-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2500-15-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2500-31-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB