Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 06:03

General

  • Target

    License.rtf

  • Size

    4KB

  • MD5

    b673ad39ce7ff047b492ec651d84c777

  • SHA1

    67c94925d4ccb910f0c135b830bc122cb33d5a1c

  • SHA256

    f7b42b543592fa59fda4e0cc23de7814c5e64ceea7031222636451242bb9bf62

  • SHA512

    525edfb0c655138af6add9907dbe8f40042117c9c7fc7357fc24945f063a35b8b5bcef23b9d520c7dd13cd2329aa5ca6217d4423864acf5e3322ea8c84b97ea3

  • SSDEEP

    96:MCWqJw2EY5JVSFXbwx2ABdDhYki4s9CE6bYuGI9bK6Xlcg6tRkU4qfKzt3fKO2:YquRFXbwx2sdFYki4k96bYm9uolZSRkS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\License.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      801915c8a9da2e211f7aa70d1e8f1b22

      SHA1

      1f83128995f3f8f52083fb7fe3061ab8f72835f9

      SHA256

      c2edaa60427e6466431308a57108d66051b8dffdfb594d78a45ab3fb48a5390a

      SHA512

      30d5b03fbc0ac5bbc1e6b08b8e08a16480ddd9d99e6b21e0455f60cfbe5800bc5259060ff65bbacd2ec8c4f97b67200e0ff180c0dfed2a8e0616384228c859de

    • memory/2532-0-0x000000002F531000-0x000000002F532000-memory.dmp

      Filesize

      4KB

    • memory/2532-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2532-2-0x0000000070ADD000-0x0000000070AE8000-memory.dmp

      Filesize

      44KB

    • memory/2532-5-0x0000000070ADD000-0x0000000070AE8000-memory.dmp

      Filesize

      44KB

    • memory/2532-23-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB