Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 12:12

General

  • Target

    $TEMP/license.rtf

  • Size

    15KB

  • MD5

    a68888617e49a38ecdc9d37d4ad4bb0f

  • SHA1

    8ead5f3a07309bd43d4a7d3050816daa3eb794ba

  • SHA256

    b64310f29eeaf0f12c84c015b76af682a1904a4e25a9dcf3619a579d1315dca7

  • SHA512

    f8120ba06f7fa6c3f6e9e56be21d80deec2e8563fdebb168f9fa16cfe36cbdf84d78d5f750056b82bc6e9653104840f58a6e56cf69e25c60bd8fb64a64d3117f

  • SSDEEP

    192:doyiN7vCHjJnNCN2N6Sc9wnsmjeA9WxAWRVEzSEfcrYEQxTHzridjlpNoj6RVIQj:OyU4CUoensmmxau0HCxpM6R+QDVsMx

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\license.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3004

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            e2df2839b94cd203f4c913cd38ca1356

            SHA1

            db021fff52884664f4fad2cc7f31fdd9a3d95152

            SHA256

            e99902a6c1a43d0ff5d23b4a7ff10d1f41e52d6a8899bb2b6bd8a19f2b5ca5d6

            SHA512

            dc765f4b611cf055866d9e73ca1c1735805c6eb559d416e0763e0a7ebbdbc748517ef90a7868825c1e57e6d0ae0b951c54fc3c1f969578a25931b078f2ac740b

          • memory/2264-0-0x000000002F841000-0x000000002F842000-memory.dmp

            Filesize

            4KB

          • memory/2264-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2264-2-0x00000000715CD000-0x00000000715D8000-memory.dmp

            Filesize

            44KB

          • memory/2264-5-0x00000000715CD000-0x00000000715D8000-memory.dmp

            Filesize

            44KB

          • memory/2264-23-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB