Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 23:52

General

  • Target

    57669455ba015458fe437808b28e653eec7663d38ab6090d77a8d22716e5c1ea.docm

  • Size

    37KB

  • MD5

    b9215569a28f02cb8480221d82ad5afc

  • SHA1

    8fc7eba4ccfeabab4e7f9b63a84c4a82f05edd57

  • SHA256

    57669455ba015458fe437808b28e653eec7663d38ab6090d77a8d22716e5c1ea

  • SHA512

    16d0eaea068701bc2426db0617a431d5f73cdb721794871eab7c4b08b81f87b10c0fccb6c7a1c598653cb1e5d6aa807abb2d1b160bd31e31f17ee70f827fb16f

  • SSDEEP

    768:/I8Kicd8bnds5tCRnBK6F1LCA5pExl1fhjn1CS9BjqaaXHuKdEfB:CibdMtG99H58JIS9BjpAJEfB

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\57669455ba015458fe437808b28e653eec7663d38ab6090d77a8d22716e5c1ea.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d43b4262bcf36d88e5e7fc5aa99324e9

      SHA1

      888f5b38e8486028681cc782180cc66b4bd7eea0

      SHA256

      cb26e9ce9477347ac4ede105f0e75603c78c36190ada614e7d0e509ca69e6bf5

      SHA512

      de21f4057042e80b70bbfd99b498f06a352a47401c4388b288e702f6d1f3874407d770ad858f890b664d197403839eed63ed4dcbe5f6a697f04fb5114c49a509

    • memory/1968-8-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-6-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-7-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-11-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-13-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-12-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-2-0x0000000070C3D000-0x0000000070C48000-memory.dmp

      Filesize

      44KB

    • memory/1968-0-0x000000002FE61000-0x000000002FE62000-memory.dmp

      Filesize

      4KB

    • memory/1968-9-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-5-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-44-0x0000000070C3D000-0x0000000070C48000-memory.dmp

      Filesize

      44KB

    • memory/1968-45-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB

    • memory/1968-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1968-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1968-64-0x00000000003A0000-0x00000000004A0000-memory.dmp

      Filesize

      1024KB