Resubmissions

14/05/2024, 20:19

240514-y3zbwaee7x 4

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 20:19

General

  • Target

    amrts.exe

  • Size

    2.7MB

  • MD5

    ab74e46fc8987c45b38b8c998a4c84ca

  • SHA1

    fb74ed58be44eb103646a1d63e6d8dc6e103ad98

  • SHA256

    94d12cc0672f0156478b5daec3263a97cf21c179b6bc7e73c494663ff1bf3394

  • SHA512

    e43e51e49bc54375141540aafbe0cdb8450a2b5eea0a41bf6084f6b708824ea71f4f4113caf44bca05aae75952760d963816e22816ff43bb63c12342f71877c8

  • SSDEEP

    49152:6x/upC2r/JgRgnVBc7qWtvP7GnWiEWyjv3D/6lhPYl:dplJguVie2H7GnWiEr

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\amrts.exe
    "C:\Users\Admin\AppData\Local\Temp\amrts.exe"
    1⤵
      PID:2212
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2108
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ConvertUninstall.rtf"
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2544

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0002.doc

              Filesize

              443KB

              MD5

              0d207f2d37c2b270bd7b97f86ea8ce67

              SHA1

              78b6fdd0141a48533c2377d0e6d65f1181d4065d

              SHA256

              50052bf8d234e599c5d114a3f4bd594de8100506cc191d1b0f4bc5fea118fbce

              SHA512

              7462c5a7c5845bdc77740d7f7d469f4ac2a0275f69c7188ab8b5bbed12a8cb85b4a6ee485afd5d69172a66c4a7b967308e14d562fcc9b2f5577db2d7f258f850

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              8efefed3ef5edbf2bd679e9c03177f37

              SHA1

              458955fd96c5136b68bbefdd13b7d06e8818a5f3

              SHA256

              fda02db9cf3c57a8ce10f3611b15180ad5736de0021ed63be290aa7d4c1285aa

              SHA512

              6aafe98b035b6395a40e243c92b2b52c488b505c8ad89ecf9f7a6fcf9f1f9421b7933fc12aac974c0b3c453931d2bba017772eecbfa3b493a6805e80bccb695c

            • memory/2544-0-0x000000002F131000-0x000000002F132000-memory.dmp

              Filesize

              4KB

            • memory/2544-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2544-2-0x00000000719CD000-0x00000000719D8000-memory.dmp

              Filesize

              44KB

            • memory/2544-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2544-47-0x00000000719CD000-0x00000000719D8000-memory.dmp

              Filesize

              44KB