Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 01:56

General

  • Target

    fdfd3dc44f228aa3ca47378ec9bcc153fe02ce98d82f1f414e62ac2cebfdd203.rtf

  • Size

    2.0MB

  • MD5

    55ce5bb1735a4ab6a309b21e9ad1cc6f

  • SHA1

    c39fcad603fd9baba05d420a305e16d1c238ca2e

  • SHA256

    fdfd3dc44f228aa3ca47378ec9bcc153fe02ce98d82f1f414e62ac2cebfdd203

  • SHA512

    8ab09701c9097c4a6d82a862d05f7426bbcba63e22a3ce21c48b35449bedf2d888efddc7b2562b539d19d163841aa6c045b3b39b13018c32df9c5ee76005b73d

  • SSDEEP

    1536:9qcdjnciUBTOK6rQXTIC0UIlduS21xAE+QqJyez3uj6MVX2GRIi25ILPNNdm5x3W:4

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fdfd3dc44f228aa3ca47378ec9bcc153fe02ce98d82f1f414e62ac2cebfdd203.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      e34ffd41533abfbf983a4b7be922565d

      SHA1

      87004234a48bf8e600ad6109b6038e97ee4477bf

      SHA256

      91a98adbfcca1b50482a72122c82f8ee068d75915a137dbdba5c27f481e23f32

      SHA512

      5186f0f29183588f8418dd795246a7467860616003f7e5de3f3ed504e03855f56d0d4de68ba80753e2c4d076efeb51c7e1c8b6b526a6225d35e6eafdd29806fc

    • memory/2928-0-0x000000002F2D1000-0x000000002F2D2000-memory.dmp

      Filesize

      4KB

    • memory/2928-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2928-2-0x0000000070D6D000-0x0000000070D78000-memory.dmp

      Filesize

      44KB

    • memory/2928-16-0x0000000070D6D000-0x0000000070D78000-memory.dmp

      Filesize

      44KB

    • memory/2928-32-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2928-33-0x0000000070D6D000-0x0000000070D78000-memory.dmp

      Filesize

      44KB