Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 09:51

General

  • Target

    东明县菜园集镇北王庄等9个村土地整治项目二招标文件.doc

  • Size

    529KB

  • MD5

    1323c0bd70b4872e4181ae55f580501c

  • SHA1

    5384b4389996560682ec3ed7ed6175702ffd6508

  • SHA256

    7b2e825913209ffb50e7fdd37112e5dea12064f89d55b3601ae1b41b2aa1ed81

  • SHA512

    d53b62de3025d183b58647257abb1a0cc031b03e7638927b0c421e0bb9f6fc2b9c8cb75ded0323edcc71793e8da6a6c8f1b2cda7ac29ee5b37ee982e58830ba6

  • SSDEEP

    6144:HoZ38MwrKsAfIUqkiiiXiiQiiiMLiiMLYiaiiipiiTfPiiIiiigiefiSiiKiiXL8:9ipTp

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\东明县菜园集镇北王庄等9个村土地整治项目二招标文件.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      705109d203ff2f7c25118fa3fe62ee9d

      SHA1

      62fa6f01aed6ed0bb38d43c13034429e4e1c48d9

      SHA256

      c94c184ea5be97ef7069413c78b33583274fa500f99c5c2716c614383000ea71

      SHA512

      81aa21d151bdba8f57444242954ff6a02d51d83b6b3c26d912751c576319543727890da7b761800daa7f26000b239452f135cb4bca751428e47a0cfb0f0fe6d6

    • memory/2136-0-0x000000002FB01000-0x000000002FB02000-memory.dmp

      Filesize

      4KB

    • memory/2136-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2136-2-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2136-11-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2136-32-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB