Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 10:56

General

  • Target

    Hot CPU Tester Pro/license.rtf

  • Size

    58KB

  • MD5

    a4e5449162d43c489b7dfd87e44556b2

  • SHA1

    6c6f8e5fd380b3612d5a24ea5416554931534bbf

  • SHA256

    692f651366dd465692b5d0c25c7688e55524bf8f106e6906984d7f055b4ddb04

  • SHA512

    484f0350bbfee046da8daecc1c47e930b90fd66b6678f490ffc686a79df0b3a8e03563a3494e301628082e106bec200b9a6985c49bcd66099f6352f47208be06

  • SSDEEP

    768:PqBuX6yWGKL7t7HubwFokuznZ9KdbmQ8VQ/16OvJwdKqHKJa28czHhD2+ZrS14N:PQC0H/1QdKqE7DN

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Hot CPU Tester Pro\license.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      40cfe52b204bae8a2d6fd82a3692e0a9

      SHA1

      abc3db73bf2e61dc05c2d3de24e67450a24f7f04

      SHA256

      2044a230db9d7aafca8234c5f6fb72ab092e84c4e9ddf736ce02d1701133f410

      SHA512

      1670291edb783e98ba578c60a52fdb01bf244f4d64f91e27560d1abb0d90006333e0b7c655a963be2d443ae067d929e15c9c73f2984738d9b65a4b7e4918be9d

    • memory/856-0-0x000000002F281000-0x000000002F282000-memory.dmp

      Filesize

      4KB

    • memory/856-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/856-2-0x0000000070CBD000-0x0000000070CC8000-memory.dmp

      Filesize

      44KB

    • memory/856-11-0x0000000070CBD000-0x0000000070CC8000-memory.dmp

      Filesize

      44KB

    • memory/856-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB