Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 21:21

General

  • Target

    MsWorld.exe

  • Size

    128KB

  • MD5

    7bd8a009b84b35868613332fe14267ab

  • SHA1

    d36d4753aab27c6c5e253b9926406f7f97dc69a6

  • SHA256

    56511f0b28f28c23b5a1a3c7d524ee25a4c6df9ac2b53797c95199534f86bbd2

  • SHA512

    ad8e121f601f6698d720181d486da828781f729ca7880fb35c6fc70f021197e4a508dc46d980108a168ef2c6c89a62f3140e676ff71a1e40ea3e397ad0c63261

  • SSDEEP

    3072:6wzn3BP7bo4a8uqwE6WPSUQvdIeaiQFc/sz4Px8vy+sL:R3BPP9G4Qvd/aKk4p8q+s

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MsWorld.exe
    "C:\Users\Admin\AppData\Local\Temp\MsWorld.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3012
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2564

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    226KB

    MD5

    2b9caaa1aafd0618289c026a4d81d759

    SHA1

    0b7c9ce60f458fff5bf3ea8d6bb56215361399bb

    SHA256

    1c9f2c6c9fbc479e72f805fb9f88b06b6b33e685980085b6432a7686f33edff9

    SHA512

    b465881aa48f865d17c2db8dbea981647ea4b1e0234e17b799372639a0ce6a6031c0a508f0693a84cd01a34c4c40144f4e62a8bb92e314fc0e511ab10022d6c6

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    240KB

    MD5

    60cad3f99c45969f17d5e3135cc5e41b

    SHA1

    4b470e29bc6728dc997e55d85a7d71ad2ac4c9d0

    SHA256

    e0d0e9d5a8e503ee66d25b9857a330b061a048e5c493fa46b709ff5d0b608b2a

    SHA512

    cc12597c7635e4c95f4e828db34fb2d590340f78f8704767949232876d9a99b3030451d14b6eaeaaadfc0b06c268f366a79f652038f4bdfdbc4887ca38c2ebb8

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf
    Filesize

    970B

    MD5

    754f2e8286fb172efe8f3811339e51ce

    SHA1

    38a1d6e81ee5c37c6405fcdbd813e9324b36afa9

    SHA256

    9ccfe7043a83733610f5ab871691406cb2501e0af8439f224e137bba5af22f2c

    SHA512

    5ffdff828bc2c7db236b4a75de820a2ca8209dc7043b416dd345872b9f595048f689b89904bd62ec002673fd9196a81dec705533c24284e5cd00efd316c25676

  • memory/2564-2-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2564-3-0x00000000736DD000-0x00000000736E8000-memory.dmp
    Filesize

    44KB

  • memory/2564-103-0x0000000073B11000-0x0000000073B12000-memory.dmp
    Filesize

    4KB

  • memory/2564-129-0x00000000736DD000-0x00000000736E8000-memory.dmp
    Filesize

    44KB