Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 13:32

General

  • Target

    VietFood.HN.App.docx

  • Size

    55KB

  • MD5

    7ebe7b46ff1111d89de1a062d1deb198

  • SHA1

    6bbc63037b4e59c5f842a25823dd2c322f65304a

  • SHA256

    67974a95f3fadb7ea6577734c19dce8b09daff87d418fa9aefdcdd6767cc492c

  • SHA512

    17ef00d69fb0adc5173f9938779685fd687508574f9603fc94efc8da727571d6a23391621b70a957cf42920bda4bbd4fdcf37c5b7f698610f443d796c6241ac0

  • SSDEEP

    768:LABb3k8NIUyrvkpG/Vi3tcTFfkzvniAv52ju664dweihV5MhlV7MVc88Q:sBTJc8ltq9krniAwfKeY7I2/8Q

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\VietFood.HN.App.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            cdb38500c8b256d24fd503654cdf3dc1

            SHA1

            6758b92d24a4add59be17d94c9a46f78f36a4f71

            SHA256

            d44bc136c1235f394342a6ec29e9500ce6c971694004d77ff5b0dfdc6a723ea0

            SHA512

            e5bfb4f2ab5125156faac1bd28b417b2f3fc72302462b3df046818f36219ebea9624f0543642b2c352ae000ac1e096c096af819fb217eafb87ab5d6a3c36b2a0

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • memory/2368-0-0x000000002F581000-0x000000002F582000-memory.dmp

            Filesize

            4KB

          • memory/2368-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2368-2-0x000000007168D000-0x0000000071698000-memory.dmp

            Filesize

            44KB

          • memory/2368-20-0x000000007168D000-0x0000000071698000-memory.dmp

            Filesize

            44KB

          • memory/2368-40-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB