Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 23:59

General

  • Target

    计算机基本技能/操作题/01.doc

  • Size

    19KB

  • MD5

    2c069a36e452e3c503aad567f6c4aa07

  • SHA1

    d0a0df1d0b8ea06496c71197bb29c9c1fc3b887b

  • SHA256

    1e51ab6b857ffef25a706f03e804f586cf3c8f6e87fbeae8c28be92372e20181

  • SHA512

    5d7d13ec2697d8a483b4ee1cda97eaa6244312a5d7bdbac1de9ed7d11586aefb20906cec5b175ada04c408417a92ad1cfe05ff0aacd08278436bdd5212b4f228

  • SSDEEP

    96:FGntDcvLf1K1sGYbL7i+lc4Vo9hJh/ZYAAdn3Va:FGntQvj1E0PiedlV

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\计算机基本技能\操作题\01.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2488

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            876691d41cb0f8e73fe100ad33776bc0

            SHA1

            5f590c92820ea19aef4679e53b4713922cac1b5a

            SHA256

            be4e2f91c03d943f3ed1e758c05384789a7aca29ff8a1440f7dc1d3e13cd3c7e

            SHA512

            04b867e8f016b56ea429e20c50a5a756232d28010272ec1f1843a91a6e941dfc56e1d38d17685564417ccf2b6393cec671c04ae4aa24698c39c08d62d454209c

          • memory/1728-0-0x000000002F4D1000-0x000000002F4D2000-memory.dmp

            Filesize

            4KB

          • memory/1728-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1728-2-0x00000000714BD000-0x00000000714C8000-memory.dmp

            Filesize

            44KB

          • memory/1728-11-0x00000000714BD000-0x00000000714C8000-memory.dmp

            Filesize

            44KB

          • memory/1728-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB