Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 16:12

General

  • Target

    Einladung 7. Senior-Treff, Mittwoch, 24.7.2024, TC Wander.doc

  • Size

    35KB

  • MD5

    f9b1a390b27ca0993e6a7a12d68c326e

  • SHA1

    ed005a9ec648768420e14ce07e471840b672e958

  • SHA256

    c5ce1a771a8268f65f8438bbf39b58a5d0abcb9cec168437eefeff66b517148c

  • SHA512

    30a949f3e246f83e6ac59c2e4f0bbe3cf92e4c32b052d17e3066e7bd3aed1b4e1c8e5962a0c11c1d6df22128f6e044b0aace949ee2fe5fb713b784c4265c11f6

  • SSDEEP

    384:jNiu1fA+UXtksrsN4DiSC3Om+vakgw2OM:jxfAvtkxN4SOm+Ckx2O

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Einladung 7. Senior-Treff, Mittwoch, 24.7.2024, TC Wander.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d0e455c2ee569acc740767578e2f1a30

      SHA1

      c22402d4303e43799395adeab3d20694752ba747

      SHA256

      68b866df59127750d6bc7d9a079eecced7eb4790e22e90e62c692edb316b1bd9

      SHA512

      c0c0eff9b7df05925080fbc24611f638d5b3c03d32d486d8b5c99af84648d5423d6b1da8e11ca7a7ede1d430e68b75d37493e0acd8da9080c6073fa9ad9f2c9a

    • memory/2040-0-0x000000002FDA1000-0x000000002FDA2000-memory.dmp

      Filesize

      4KB

    • memory/2040-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2040-2-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2040-11-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2040-26-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB