Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 04:24

General

  • Target

    附件2:业绩表/中级业绩表/79蔡永皓.doc

  • Size

    88KB

  • MD5

    1d04802d98bef86eeb0455188d2f02bc

  • SHA1

    4feacdf19426794183f432449a5ff894254ccdb0

  • SHA256

    190431dca5dc072b95a4700cd183f87ab416d3039b653cee3323dd69afb9adb2

  • SHA512

    0fc3a1dc2238c92edf2540db7fc455bf0ffd94ae9a3d55c2c76cee694c7a8fba79d222ecef41d596c6c75a7fe65c3829a7512a16a23ef66f0869e0997e2709eb

  • SSDEEP

    768:ymQ2m9fZG7ULTtdZOEnBeVgu+W7PIPgJW:ymQ2CfvdZ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\附件2:业绩表\中级业绩表\79蔡永皓.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3020

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            90fe3b93972b9a3445227942b6d6d59a

            SHA1

            eb695f13c3ec71dc800e25da86247ff6a844f52f

            SHA256

            9de4b77852de5324b0d7e8a5f397f1cf88469b09d4069100a274c9f7cadd49b1

            SHA512

            2f0f5b54bcdbfdefb475ac61a0540f7cc1907b6833c21b185130b6f177ed0fe6cfb6a019f92a8b3a376dcc6847000369277e3e1c832dd3500d42012ae8b826d3

          • memory/2184-0-0x000000002F191000-0x000000002F192000-memory.dmp

            Filesize

            4KB

          • memory/2184-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2184-2-0x00000000710ED000-0x00000000710F8000-memory.dmp

            Filesize

            44KB

          • memory/2184-11-0x00000000710ED000-0x00000000710F8000-memory.dmp

            Filesize

            44KB

          • memory/2184-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB