Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 03:56

General

  • Target

    resources/app.asar.unpacked/node_modules/node-notifier/vendor/mac.noindex/terminal-notifier.app/Cont.rtf

  • Size

    436B

  • MD5

    f0d4a61caf597423ff07c5e9b24a345e

  • SHA1

    60a248148b319de26e36424d25021c2488e23ce8

  • SHA256

    b4386fe1cef65cd91e6c8ecc065d117089083f91b7cadbf0c3e5eae20e8b9640

  • SHA512

    e361011499cf70fc71e247fdda71f49d913654a983aa4ae67d00dc977e53b9cf0d88d4d2ac07efe248261c3ab6e3345e829e22dda3e51dccc221a94c660ace69

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\node-notifier\vendor\mac.noindex\terminal-notifier.app\Cont.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      ee6e6297a90057f6d64925ec14086fdd

      SHA1

      3cbb4acc1ed356c73ba7bfa54cd053ba84d5ed50

      SHA256

      3c4eecc4eb184c61fb9c59fecb7c4500183a98f3b20346928430b8acbf5da643

      SHA512

      2d0f9c309c00ed345108ff89226bd6b5889525e6c3059767b677ed0da1a8eadda33d9970d55066c31cef42d4f69c11b31ded94990d78ba046722be233e72b09d

    • memory/2312-0-0x000000002FAE1000-0x000000002FAE2000-memory.dmp

      Filesize

      4KB

    • memory/2312-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2312-2-0x00000000713AD000-0x00000000713B8000-memory.dmp

      Filesize

      44KB

    • memory/2312-9-0x00000000713AD000-0x00000000713B8000-memory.dmp

      Filesize

      44KB

    • memory/2312-27-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB