Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 06:33

General

  • Target

    wwlib.dll

  • Size

    72KB

  • MD5

    08dbf918208f44f0d74d096a901358cc

  • SHA1

    0def86a1ad13283fe79f2e3d4f139eadd298d138

  • SHA256

    a64997b94ebfea461c95d445a4d13aa4c4bd49604451208746d95d106b677053

  • SHA512

    84ce422251a18bc0c3989ffd90a37f3aafe21c984fd8727384606f67f9b4f7f490dce1a960ec26b3a080204efd7bcde13b8cef19acec4ff28c534021c5f452b9

  • SSDEEP

    1536:OqZc36GWQ679o77Kl0Evn9JKFkpQ1Ah1:OqZQmz0+l0Ev9FwAh1

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\wwlib.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\wwlib.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx

      Filesize

      39KB

      MD5

      b9c4cfefa7917160f4f0aa9d33c36eb1

      SHA1

      01f5b14973d3e29bd091a34df813d4959d2a2893

      SHA256

      a4bfbccb9b567e077d1998cd081df974ebde88ce8f2c8319353fb404a3293a73

      SHA512

      0cdca0417af28bac87499e5d104ddc6fc41b998fa5aea34eaa48101c422cbfa4f1507dbee95963e71846b3036f4940160f013f8d29ba8366e02da45f9275dbed

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4bc7583198e3171dc330e03c8c18cea0

      SHA1

      2e3366bef1f9f04846392291a1a9bf560490b080

      SHA256

      8aa0ed7c118c595de007ddeefd933a0478cfa94c2838ace9af66dfed0711dab3

      SHA512

      d4945b2d92557fd59a74a911512f54f9a7db397d9fdc7f57f15b420660e604aebc765f8e69b2b59e1f00e7f6e9a4399ebe6ae4104de9636208131c8bd5ed7e84

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1308-2-0x000000002F241000-0x000000002F242000-memory.dmp

      Filesize

      4KB

    • memory/1308-3-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-4-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB

    • memory/1308-26-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB

    • memory/1308-47-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-48-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB