Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 00:07

General

  • Target

    8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.exe

  • Size

    409KB

  • MD5

    dd51ac4578bf1e3a1cb4f224eb2b3838

  • SHA1

    27748001ac51617d17d03fd33f9cea4b1a9d914c

  • SHA256

    8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3

  • SHA512

    75c6c0116494af22160fd43a84f2ce8bd04506377fe424d4652c9dec514f9b4770f1ddf3dbd2e27b51a3bd5029c48f9043b1357e335f9da5c0daef257c75021b

  • SSDEEP

    6144:ho+k6sXkPV9WBtpypFBK4Tu/67ueS70bLoNdvh6GixXrrilbrcRkP59wZbGsHE1:GrWcDkpFBK4TunenYp6GixX+cGxgy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.exe
    "C:\Users\Admin\AppData\Local\Temp\8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\1767.tmp
      "C:\Users\Admin\AppData\Local\Temp\1767.tmp" --pingC:\Users\Admin\AppData\Local\Temp\8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.exe 7C4D431302F8D81FB90007695B4BDE409625DA5A634CE51718BC4F794AFAD28BED66009A0CF2F9466AB1305DA1887BADA404D237F96FB819764C80CB628575DB
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.doc"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:2476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8662ab81d52c62f77a0c6884159a14adbd289930bc99a2245d4c6f5cf8e181c3.doc

      Filesize

      21KB

      MD5

      12e57ae08f64353b3c3b3d08681aaaf1

      SHA1

      36b6aca282497c65d41513b231d247b0187651f1

      SHA256

      07498e905c47bfea983587265b88eb01bc6098978c375c71074b9469a99b4308

      SHA512

      aba2748b1b5d26f52a93bbfabbd4760435b06d6c449631930e7db339c5317429f59cc24709515707cdda34956c73d30e60b83b81986873eb544b1040388748a8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      a41df8991a9601dfbf912645c1d27836

      SHA1

      d837b71b1efca1d65eda8749dd5e3dab349c852b

      SHA256

      2692a0df069ca1b13a9df9956a32daf232376ab263327fa18869a1ac2392b847

      SHA512

      50f71e45f7f55994f319df72d8895e62bfb4b7f406f674da4fd0bd4fc4b11c429b9a5972278d555c07c17cfcda7ed170d2a6f40fe27c96dd5e03adceb1712c94

    • \Users\Admin\AppData\Local\Temp\1767.tmp

      Filesize

      409KB

      MD5

      bb05cdcf26785bf7ff36be64e342548c

      SHA1

      31c9d83c0669781ae0992694eba8571e397ef6f9

      SHA256

      85bca2ec834d72f40ddfaa93b9df735c6e084be2270fd7bac4939093e1687572

      SHA512

      e906e400f07058ae7fe828cbfc037548a4c704a4ca074072ba2af7240cb69256ea92d2690d87b78d548a55bf66a387850362ae21831f77a75bf5269a02c00e1c

    • memory/2868-7-0x000000002F951000-0x000000002F952000-memory.dmp

      Filesize

      4KB

    • memory/2868-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2868-9-0x000000007196D000-0x0000000071978000-memory.dmp

      Filesize

      44KB

    • memory/2868-19-0x000000007196D000-0x0000000071978000-memory.dmp

      Filesize

      44KB

    • memory/2868-34-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB