Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 04:24

General

  • Target

    附件2:业绩表/中级业绩表/81王凤玲.doc

  • Size

    89KB

  • MD5

    55d6fc2488ab510bcfcca900c05ff584

  • SHA1

    3b4eae520177d39044a913bcd8fe7e747a06eff7

  • SHA256

    325ac6491755b02b9ce7043c1ed46ad44ca792aa4b83cdab28631714fa28a8b5

  • SHA512

    767628a8b75ffcff81499dc30757e6c03c1ba4df0c3c074bba10c678ed800e1fddced602a3fb42ebc45d0b6cbf5060ca879923589272ff51a87659ebf663c0bc

  • SSDEEP

    768:DMW0nBKY/N4hE3TYEsH3ScZ3caPlTNAsI6masO4YNzJPR0usWgu+W7PIa85B2:H0BSNf+p

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\附件2:业绩表\中级业绩表\81王凤玲.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4455430f7981c0b0d3f6a75828a4848e

      SHA1

      7f314608640323cecb513dbdf98ca7c6eea7e59a

      SHA256

      11592dee7b2a281df1183b10242a69dd1ac1c6bb3e0331239f45ac5ec51ec514

      SHA512

      80fcd2ac719e5a59ab548da750f3f3b292c58eb3563858a86f73f85ee11ebea6fec9c3dacb150d170895900fd5f70e7f4429986ba82379dcb607ecff9f959dce

    • memory/292-0-0x000000002F0C1000-0x000000002F0C2000-memory.dmp

      Filesize

      4KB

    • memory/292-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/292-2-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/292-11-0x00000000715CD000-0x00000000715D8000-memory.dmp

      Filesize

      44KB

    • memory/292-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB