Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 12:19

General

  • Target

    M3BTZEP.docm

  • Size

    61KB

  • MD5

    3f21eb3c6eaceb54872e6e48553cbdd2

  • SHA1

    9df55ee8c80bc8aead1cb26830b5f0ddb7fea69f

  • SHA256

    ea5bf36a687e13701ed03a095dc53abac19b7691f3647cfe03e824df73c5c484

  • SHA512

    d919430c67d123d26d7fcd2d3fb2334b2a4bdbfc697f95d297116030e702a77651913fb922e7110e2873c10c2fa61d8729f81304b3070158533ed59402a01918

  • SSDEEP

    1536:KmYpTLalX5DQSn9JPzvFnJHrul2hBbtTdPP7y:KmYpX0XrtvHLqCDPu

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\M3BTZEP.docm"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1612

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2132-0-0x000000002FBF1000-0x000000002FBF2000-memory.dmp

            Filesize

            4KB

          • memory/2132-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2132-2-0x0000000070B5D000-0x0000000070B68000-memory.dmp

            Filesize

            44KB

          • memory/2132-5-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-6-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-24-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-21-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-20-0x0000000006760000-0x0000000006860000-memory.dmp

            Filesize

            1024KB

          • memory/2132-9-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-8-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-7-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-37-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-60-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-63-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-62-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-61-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-65-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-64-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-66-0x0000000070B5D000-0x0000000070B68000-memory.dmp

            Filesize

            44KB

          • memory/2132-67-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-68-0x0000000006760000-0x0000000006860000-memory.dmp

            Filesize

            1024KB

          • memory/2132-69-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-70-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-72-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-71-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-74-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-75-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-76-0x00000000052F0000-0x00000000053F0000-memory.dmp

            Filesize

            1024KB

          • memory/2132-77-0x00000000005A0000-0x00000000006A0000-memory.dmp

            Filesize

            1024KB