Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 11:54

General

  • Target

    e6f8c685fa9c16647d1787bdc499727575dc1ec788a9f1ed96927797f0642f07.rtf

  • Size

    2.6MB

  • MD5

    805761ef7834bfa6015198edc4888485

  • SHA1

    60095fff61b426309ed4da1fefd85222bfafeaec

  • SHA256

    e6f8c685fa9c16647d1787bdc499727575dc1ec788a9f1ed96927797f0642f07

  • SHA512

    0332d8232416935f503dceaacd426dff142d04ea98c05822b8cfa05060b871f99f51fa868272906836ac83a6bddf744d91a4be9ab8877b2dfd4c86bb5c424885

  • SSDEEP

    49152:tZomloJ4c4DrP3GqbKhu8i4yQc+JO7QV6T9h65vgZqDBU3klnE4doynnakeBzjsi:49/zvpQrK/d3c3DfL1

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e6f8c685fa9c16647d1787bdc499727575dc1ec788a9f1ed96927797f0642f07.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      f49f635fe7f65699b25ebbf15d629eae

      SHA1

      1062e721f95a62282a215e90355aa660532f0f9b

      SHA256

      42d2e48e7d773e5e3a94567479ab60f9872d35cd5c9e94010725ba815f6f7aab

      SHA512

      ad7b13d172fa22807e41f2639fa91f2c75d83d840f290a49ee29ca630d8a1f2e533f0daba078ebb983ed9ebb15f443371c3ffe40bd25b458c0d9ec635c3b9986

    • memory/2772-0-0x000000002FB61000-0x000000002FB62000-memory.dmp

      Filesize

      4KB

    • memory/2772-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2772-2-0x000000007097D000-0x0000000070988000-memory.dmp

      Filesize

      44KB

    • memory/2772-9-0x000000007097D000-0x0000000070988000-memory.dmp

      Filesize

      44KB

    • memory/2772-30-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB