Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
Melissa.doc
Resource
win7-20240729-en
6 signatures
300 seconds
Behavioral task
behavioral2
Sample
Melissa.doc
Resource
win10v2004-20240802-en
4 signatures
300 seconds
General
-
Target
Melissa.doc
-
Size
40KB
-
MD5
1c17cfedced1d53cb3866a6a8ed065a4
-
SHA1
0fc9af3aeac66709123a115804e2080c2558ccc4
-
SHA256
d279b25587f8d2d6e22bf6c8b534fdac0d3971ea34c2f264e29aa3c8c4390d9c
-
SHA512
50940546c837557c8216ec851716d23edd4db79083d07e32b73d7a5b0e9698d2b847ea30a744678d24aed680e8b96b18c28b0b849b292479b65374398601eb73
-
SSDEEP
384:gfLAmQKcIc719x1XG4rFmWfFlmipZ/pwlyIuD9AR49lz02gzIK1Q0jZMuapZtRPl:e1g19/X5frpMyI4ACIv1nacWPiE
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2488 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 WINWORD.EXE 2488 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2944 2488 WINWORD.EXE 31 PID 2488 wrote to memory of 2944 2488 WINWORD.EXE 31 PID 2488 wrote to memory of 2944 2488 WINWORD.EXE 31 PID 2488 wrote to memory of 2944 2488 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Melissa.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2944
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2568