Analysis

  • max time kernel
    66s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:09

General

  • Target

    2023-03-08_1157.doc

  • Size

    548.3MB

  • MD5

    df03ab3720154f245c109759ae06913e

  • SHA1

    1f4ae4072ca354d3337f578b74b7526f7fb2bbee

  • SHA256

    a85fa869a88e0c5464efb2e86ab86b97035374ea96bcc9c59a4fd7f7e3ba5de1

  • SHA512

    cdc65bbde648ac2349b566003be8b6f9f9a74c1439f09faa81d0d3b29ff4037be57d9bbb4a2588847b1ac528cec82c5e205ac02862dfd64cac90ea0c0e3d0b56

  • SSDEEP

    6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-03-08_1157.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2296-0-0x000000002FEF1000-0x000000002FEF2000-memory.dmp

      Filesize

      4KB

    • memory/2296-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2296-2-0x00000000710BD000-0x00000000710C8000-memory.dmp

      Filesize

      44KB

    • memory/2296-133-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-444-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-425-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-460-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-449-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-467-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB

    • memory/2296-551-0x00000000710BD000-0x00000000710C8000-memory.dmp

      Filesize

      44KB

    • memory/2296-552-0x0000000005960000-0x0000000005A60000-memory.dmp

      Filesize

      1024KB