Analysis

  • max time kernel
    63s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 08:13

General

  • Target

    31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e.doc

  • Size

    1.9MB

  • MD5

    1ee73b17111ab0ffb2f62690310f4ada

  • SHA1

    3d3e2e367fe9b358bbb91e5cbcbe90250c220648

  • SHA256

    31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e

  • SHA512

    811ecc63317c2636729026d95489f6f15053c2e52020a2260a7d6896f06aad39135b0194ddfc2bdd526ecb9d497cf3af90ce1c60b28ee4f2d39f2d14f67a4b36

  • SSDEEP

    24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2764
      • C:\Users\Public\Documents\MicrosoftWordUpdater.log
        C:\\Users\\Public\\Documents\\MicrosoftWordUpdater.log
        2⤵
        • Executes dropped EXE
        PID:2500

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C713B977.wmf

            Filesize

            370B

            MD5

            c04eb249161372b3ec1102a5f8a38a3e

            SHA1

            45a7e9fdf9235ee8fdac5bb244e515af89d05909

            SHA256

            0275daac1226b684ec9845ef32a71c7fd69b2b7cfdd0b27b727a27814626a78d

            SHA512

            7745cd58679985212ff951851e8a97d4cf856a23de90c57e516ece02f9dff196435b5f3058476632884ff3497b0c3eedd0cd7a73268908ffcab41fd6998aec6d

          • \Users\Public\Documents\MicrosoftWordUpdater.log

            Filesize

            327KB

            MD5

            0d1dca5eaad49c2dbd979e1bf0b5f8d0

            SHA1

            f21b1c8c4482392d69725025e82eddd313f48aad

            SHA256

            a250740948aba579462397ac95ff10e6b0ee952c2af7d9d726cbfde9da1eaaff

            SHA512

            50f5f10de2187e10bc40195b27d4652db7d3517b490b08acc17be4cf6b7e52dfe55b9d76d7aefddd36530c1c9e3aed10a76096d55d7ccee7ceaf2f5fcb94dde7

          • memory/2028-49-0x000000007196D000-0x0000000071978000-memory.dmp

            Filesize

            44KB

          • memory/2028-58-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-2-0x000000007196D000-0x0000000071978000-memory.dmp

            Filesize

            44KB

          • memory/2028-20-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-47-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-46-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-45-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-48-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-0-0x000000002F031000-0x000000002F032000-memory.dmp

            Filesize

            4KB

          • memory/2028-10-0x0000000005A80000-0x0000000005B80000-memory.dmp

            Filesize

            1024KB

          • memory/2028-57-0x0000000005A80000-0x0000000005B80000-memory.dmp

            Filesize

            1024KB

          • memory/2028-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2028-66-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-71-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-73-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-72-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-74-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB

          • memory/2028-75-0x00000000065C0000-0x00000000066C0000-memory.dmp

            Filesize

            1024KB