Analysis

  • max time kernel
    46s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 11:00

General

  • Target

    PC_DESTROYER.rtf

  • Size

    1KB

  • MD5

    4de5fdfe13b112a9a91a6e909a038cf7

  • SHA1

    fdf5732db2b6225e95b592baf8b02f7d0a3eb55f

  • SHA256

    06bf46b7320631e40d533518ee0e9ef19d5eea632aa398c6702a9af4447b21f7

  • SHA512

    71420f8f8e49c804bad0d04fcd1f8eaedc3b71b41101deed960e0742e74d71ce864479cc9cd84a17f80e0cf48f41c676a7967b7aee438e4376325ebafdd38963

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PC_DESTROYER.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2232
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:804

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\PC_DESTROYER.vbs.txt

            Filesize

            820B

            MD5

            330a5aa59e32a5ffec6bfaf8a67668cf

            SHA1

            c85d3a03d9af6a1b51b5237cd4db73f4ca5f8e90

            SHA256

            b666100229be604b7ac068df7c7c15128cd5f2ded89299aa09835ec5e5172a4f

            SHA512

            11a785863adc2be0922694cfa61f6d4c47e5a659f354c1140fd1ae459a29061c78bab7f00080896ea3ef03fab5f56ef643659272ef6d6cfa688e4def84479fa2

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            4476e6d9c9ab87d15199889232a4df3b

            SHA1

            a56bbfae1aabc5c8394e31198aa2088f3531f758

            SHA256

            4fa4221d02231910d1cf048133551d5c8a2542ff8de9e5d3e5888f75c3b90363

            SHA512

            9c16a6491aca6e574e51858550b32954c8a0e5be9e3a80a30955a164ba2fc07efef59c98cb3af307d7af2625da97ea7b2efdefe5b296b6f79e2a85fb7709db1b

          • memory/2232-0-0x000000002FA71000-0x000000002FA72000-memory.dmp

            Filesize

            4KB

          • memory/2232-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2232-2-0x0000000070D9D000-0x0000000070DA8000-memory.dmp

            Filesize

            44KB

          • memory/2232-10-0x0000000002500000-0x0000000002502000-memory.dmp

            Filesize

            8KB

          • memory/2232-11-0x0000000070D9D000-0x0000000070DA8000-memory.dmp

            Filesize

            44KB

          • memory/2232-38-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB