Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 11:54

General

  • Target

    ha_Photilla-v1.0/Photilla 1.00/汉化说明.rtf

  • Size

    22KB

  • MD5

    9369fa1610033b179d935c6a7004e577

  • SHA1

    e68fbbe81f7f9ceaa3d3c7b6d8a4dac4cca40744

  • SHA256

    c668e7e4e53fb9e60d1f93e848e90c2988d5e3b96139dd82087cdd92ec88df0e

  • SHA512

    b53f2342ded4c76b412100583f006506a5502fec7af58b080e858bcd97ac45f52a8cc5864a3020195105c5865dcbb045bd1d126edf0f9c44c431cc0f6e23d503

  • SSDEEP

    192:BTdDY93rit0N1yPfyNccTN6KyzcBv//sPT6tTfRzlY6kJ3qCg9yPYaAk5kxin1tC:BTdDu9RkJ3qCgaas1tC

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ha_Photilla-v1.0\Photilla 1.00\汉化说明.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0e4cf82ff012178e63fafc2c12ab6c0b

      SHA1

      8c0fe4983e0d9a2c63a5073d43b9b828ee2d6d9d

      SHA256

      2166fa4d289de1d1d6679162b107d884bf64ba8582acd71a6145fbd6658b0d53

      SHA512

      8604d9a7c05e9d33c344eaffaa95e6660045a2793d41d34a7017171ad8034a665f7046d417f102fe6d3502f5e593d24eed6684c23b8df0d3f070128a4ecf2b70

    • memory/2696-0-0x000000002F4A1000-0x000000002F4A2000-memory.dmp

      Filesize

      4KB

    • memory/2696-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2696-2-0x000000007190D000-0x0000000071918000-memory.dmp

      Filesize

      44KB

    • memory/2696-11-0x000000007190D000-0x0000000071918000-memory.dmp

      Filesize

      44KB

    • memory/2696-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2696-30-0x000000007190D000-0x0000000071918000-memory.dmp

      Filesize

      44KB