Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 21:49

General

  • Target

    adjure.04.30.2021.docm

  • Size

    76KB

  • MD5

    9749a2caec0f624162f5face69dee4b6

  • SHA1

    fb2135c7ca8b93a84a5e42fe4d6b844c21b7936c

  • SHA256

    b3dbdf013c494dc354374a50e95635d53d2dabfc59527a17a5f104e8deb07554

  • SHA512

    29ac52a776927704ca72e5c26d1dbfce9bc8218371efb30f847b94714460816bcd8953d141dfdeaa9f31a6d2a879a302f2498edfb4aad2adcd927571bdb744c0

  • SSDEEP

    1536:jTcpJQrigxDjV+l0rM81NCGCPisEHOAq4eyO6i1itW7YUvOMkksCLlg33h:jyJQe6nnrxRCPdYZuyL3t5UmMkkoHh

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\adjure.04.30.2021.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2132
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2580

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl
      Filesize

      36KB

      MD5

      7f60e157695d2be5bf51328a440b428d

      SHA1

      d03b53214c3685be7f2da15a1c624c9688ba5b6a

      SHA256

      ac88470b17f030b363ade5e00772b3038c0386bfff23c904135e9b463062b1cf

      SHA512

      48bb858c415c7fd7ae0dec765d2bc77711cd3341574c4370e9cf8b5cc52c871f495a7cf74b1eace0cbfad2c987e33c0aa5333d90347ec7d2fe94ba289924ab58

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      594161d153078d233fe4c8f9befd2baa

      SHA1

      0838eced4242cd9a3cab22ecba01a8f87ffcc4ef

      SHA256

      b8dd08803e3adbe78be396ee4046dfb0d5cb124904135f2a76292110a566420e

      SHA512

      c133b6fd0ae5a0780f2d64d15f3aec19f4c5fc6159c82c34be1a46a0f3b9b70e2a85211a3a67eca8e5c7d6b7aa4ea233ee0ba4dcb6b9daeefa1f10f740c5c5e4

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2160-90-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/2160-6-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/2160-8-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/2160-23-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-24-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-33-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-34-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-52-0x00000000717ED000-0x00000000717F8000-memory.dmp
      Filesize

      44KB

    • memory/2160-89-0x00000000717ED000-0x00000000717F8000-memory.dmp
      Filesize

      44KB

    • memory/2160-7-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/2160-2-0x00000000717ED000-0x00000000717F8000-memory.dmp
      Filesize

      44KB

    • memory/2160-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2160-66-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-0-0x000000002F251000-0x000000002F252000-memory.dmp
      Filesize

      4KB

    • memory/2160-63-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-62-0x0000000005F40000-0x0000000006040000-memory.dmp
      Filesize

      1024KB

    • memory/2160-56-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/2580-45-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-47-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-50-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-54-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-55-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-51-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-49-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-48-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-64-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2580-65-0x00000000717ED000-0x00000000717F8000-memory.dmp
      Filesize

      44KB

    • memory/2580-46-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-44-0x0000000000660000-0x0000000000760000-memory.dmp
      Filesize

      1024KB

    • memory/2580-37-0x00000000717ED000-0x00000000717F8000-memory.dmp
      Filesize

      44KB

    • memory/2580-35-0x000000002F251000-0x000000002F252000-memory.dmp
      Filesize

      4KB