Analysis

  • max time kernel
    101s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 03:29

General

  • Target

    $PLUGINSDIR/iminentv2_terms.rtf

  • Size

    800B

  • MD5

    2fd8489135921dc79488469a04b42712

  • SHA1

    20c4353f127ceda5dad271c0a3d7d635d0e5e046

  • SHA256

    2485db4ce5b1c6742c5eff015dda69a961b45f0540f99c2d27e3da20d15f6a69

  • SHA512

    2c5d953753961a63ff4dc205a9fffbe0df38a325d40c55fc695cfa12ca204f34165ed8a10c7a83242451c0ff6d1aa062bad6953d67a8652bdb94ccc48e746b4d

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\iminentv2_terms.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      3a513a3909ae3aeb94bc97769807882b

      SHA1

      78b5350fe9c3030a6d19e965fd286850fdcf0f05

      SHA256

      ea1e332337a16582c510e8add8a407b7de2a2f09e94bb07175c27e5b4f20632c

      SHA512

      fedb3897b1ef1a329d1cbc35af1822512be34631e4462049124a6b342dfda9f3a8fc95e9cc32741ac13329bd3ecf6fba69bf4be90c2364ed04468c5d8d622d50

    • memory/2244-0-0x000000002FFE1000-0x000000002FFE2000-memory.dmp

      Filesize

      4KB

    • memory/2244-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2244-2-0x000000007117D000-0x0000000071188000-memory.dmp

      Filesize

      44KB

    • memory/2244-9-0x000000007117D000-0x0000000071188000-memory.dmp

      Filesize

      44KB

    • memory/2244-27-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB