Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:35

General

  • Target

    ANRITSU COMPANY FREE SOFTWARE LICENSE AGREEMENT.rtf

  • Size

    14KB

  • MD5

    a6dfda44c9124b2e8e81ad8df98789d9

  • SHA1

    ed89d6b1e4b689ab69e1b39c4175330275e0744d

  • SHA256

    298eb03c49debf0853ed788edbb0905fa76b8c74b9b618d4621a58aaef079441

  • SHA512

    757928270caac0693a5e775066b51b48f4fad1ff9b9aa94f480d5ce4727d0a98eb861c8a99de9e7703e915905de3216a890fb84a0e207bb2cf2b862011959b07

  • SSDEEP

    192:KmhyVLXbr96HMJnlNUa+jnnHXq5Ib5rzo0t:KmhyVLXbpNhYEIbhtt

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ANRITSU COMPANY FREE SOFTWARE LICENSE AGREEMENT.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2444

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      6454b62c41a91008a61b8857a152dac4

      SHA1

      0fd061d9059bae40d692a6db008a93812f921d19

      SHA256

      26175c53e61222cccc185f749d9dfbff5f940ea60c14198e50917a9d25c21d7a

      SHA512

      e26bb1d30fd044de6e23a6013cbc9b4d6a43ee34668399b0e4a722e1326a1a51cca2b8cea0c51d030a517c77812b8a70bb656dfdf1f06b1dc8f36ed8b1ea60a9

    • memory/2132-0-0x000000002F281000-0x000000002F282000-memory.dmp
      Filesize

      4KB

    • memory/2132-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2132-2-0x0000000070DED000-0x0000000070DF8000-memory.dmp
      Filesize

      44KB

    • memory/2132-11-0x0000000070DED000-0x0000000070DF8000-memory.dmp
      Filesize

      44KB

    • memory/2132-29-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB