Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 14:52

General

  • Target

    140000000.exe

  • Size

    80KB

  • MD5

    0d1c013939f390023fb0a98f006171a4

  • SHA1

    30553889a1e4d8d180afa5adacfde37b5d78488a

  • SHA256

    b8ff05612476e6f6ce429419adfc38fe71da319bafb3ba39bd72ccde95ab2dab

  • SHA512

    184884f77c8a6e94a4c106f745977f8810f2a9d286cfb1010f6a015956ee8c1be37c66d9fbea8570533d691c7d3d9214440d5169aa6d973a4c345233d8917e46

  • SSDEEP

    768:k3KIOWOiLVYVHSXgspu/aMxuyr3HT+WVXjS6c54GzzNUTf8egoKU:k9OiJYVQ/9k3H9Xyuszwf8egoKU

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140000000.exe
    "C:\Users\Admin\AppData\Local\Temp\140000000.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2116
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\FindUnblock.dotm"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    19KB

    MD5

    84c0d4f5175c08eb8ff77ed23a297022

    SHA1

    ac590c8e9bebf8734a4dfd59f274b483b63c0083

    SHA256

    c793e8d4b7b0ebc7645f9346dbe5ca46e080076279288ba23c042dce4e679e15

    SHA512

    fb7827cb20dc80f2bf88233bc5dd40a203e9f15a8d5bd48302c6e9148be89b31e63a3d1ed8ddf03d3ba4a8cbf29b925feb3c1963ae84631ac9d0a1cec06fcdde

  • memory/2400-0-0x000000002F941000-0x000000002F942000-memory.dmp

    Filesize

    4KB

  • memory/2400-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2400-2-0x00000000718FD000-0x0000000071908000-memory.dmp

    Filesize

    44KB

  • memory/2400-19-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2400-20-0x00000000718FD000-0x0000000071908000-memory.dmp

    Filesize

    44KB