Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 09:28

General

  • Target

    license_agreement.rtf

  • Size

    4KB

  • MD5

    22d18902b7ed96b4c40fcae69a29e2b9

  • SHA1

    4766d608d029cd75d7a66833bda5e22c5d731e13

  • SHA256

    6e2a71e967000600bac54690a941f1ef9b02a00f6d792e1563086005a12fac99

  • SHA512

    dc7dd9b0d023303dfcfe613c14c61d73443e4143055f986dfd19f2a5ef066149cc3006a42e1e211d2652d31087f54de68758b317b6eabee11d20670217bf19ad

  • SSDEEP

    96:gHQLexNgoiEcgitxcgi6cgi69cgiczcSXFi4aktcyOAJhAejNnm9Yxmbej0zmkrM:SQqZkgjgugigJYSV29MhAcNpxYc0zRrM

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\license_agreement.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      397e54716c3a4f6d776019157a2197b7

      SHA1

      50a6ea9f2282aee69517a66ed196f18c491a2093

      SHA256

      b61347cfdb06e68d8f0e1b2950113a8939955257701cfc085b5c75a4eef6a6c3

      SHA512

      40dacf1c20b8af698a8a8acf4cf44882023f975617ee500cb7b1167579cf5efa30b8da5e0367420d3f7d2ef18e94858e1e5f1b7ffa2ac09f81e1c92586b0ca51

    • memory/1660-0-0x000000002F4F1000-0x000000002F4F2000-memory.dmp

      Filesize

      4KB

    • memory/1660-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1660-2-0x00000000712AD000-0x00000000712B8000-memory.dmp

      Filesize

      44KB

    • memory/1660-11-0x00000000712AD000-0x00000000712B8000-memory.dmp

      Filesize

      44KB

    • memory/1660-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB