Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 08:45

General

  • Target

    1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc

  • Size

    25KB

  • MD5

    834ac7aecbf4bd415d495b6c7ea34af5

  • SHA1

    1fe73d219fe12e449d6a5dc7993776849bb59896

  • SHA256

    85136ac4dbf3cc5aa6b28110fec6eb4642195c0f7835c927cba8b0e4ee8faec5

  • SHA512

    3ca542294521d9e4b67b3f7f312e921aa3e7f1a6c0902f1380643ed6b35ad999af26f9e4d0f76bbd5c2885df47451afb81fa99a28a41f2f427725fa07737d95a

  • SSDEEP

    96:qVlW08R0JMoZCgor0A+bDiU4aLCXP0M99hzlwV7ET1R468xLQ6p7eqp0SWcvrqBj:qV4gXw+PLKPVVwV77E6N0StvG8tu5S

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\常见问题解决方法.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      a8faff7215197d5b9a287000f4c00b84

      SHA1

      91eba28b7180780d60ed1dc27c87660c9010825f

      SHA256

      361f4675eff27b74dc9a5e2d23e3da9112cba4181a8698305f418a9a44d9242f

      SHA512

      c31b7cd8969978cd89a281b15c8ea501cadc02468a156fa5f518e6e5a1b8353ecbc25b96b3dfe93d547b959d753b7dc3ea67d7cf54d0e3a3ff1c819a000307e7

    • memory/1600-0-0x000000002F3A1000-0x000000002F3A2000-memory.dmp

      Filesize

      4KB

    • memory/1600-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1600-2-0x000000007151D000-0x0000000071528000-memory.dmp

      Filesize

      44KB

    • memory/1600-11-0x000000007151D000-0x0000000071528000-memory.dmp

      Filesize

      44KB

    • memory/1600-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB