Analysis

  • max time kernel
    101s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 14:19

General

  • Target

    $APPDATA/Immunos/help.rtf

  • Size

    35KB

  • MD5

    81014ff0855380de6f47759478543e09

  • SHA1

    c00e75326364fca1f97c9b7d270cb3b3698a4665

  • SHA256

    3d68d5ab7045b5be4d29aad5c152fec6bd1173841968425f5b3329b9a6163dff

  • SHA512

    0fabc202d10bc7ffdfbe5e3f82106f94b3e4035b71368ef9c22055122db237e59d5891115192aeffe2e80efc17604d39fdd89690ecebd905e4c64b23c2fe2e3a

  • SSDEEP

    384:1fIcqb7PzybdKkuEgCNnGbTO6RE/i6rGs2AYARv6ZNYGO:1faEgCNnGb5hAkDO

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$APPDATA\Immunos\help.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      02a4ade5ea1253eaf95040de47af7b4b

      SHA1

      855a71e196a6d01618edbd989dc84a7a0f8b3ceb

      SHA256

      ebbb56ac284da3c88044f462125e26bfcf7b8e833c453d4e3095eb8629dfc954

      SHA512

      76bf4fc1debf4a7baee88901e8ff4ccf6786293ca2366791d4f0bf29967d231453a9974ef51ac543265b6c9703a31047269e60efd9d7b743aa1f4fd84c4a07d4

    • memory/2508-0-0x000000002F351000-0x000000002F352000-memory.dmp

      Filesize

      4KB

    • memory/2508-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2508-2-0x0000000070DDD000-0x0000000070DE8000-memory.dmp

      Filesize

      44KB

    • memory/2508-5-0x0000000070DDD000-0x0000000070DE8000-memory.dmp

      Filesize

      44KB

    • memory/2508-23-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB