Analysis

  • max time kernel
    1561s
  • max time network
    1562s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:21

General

  • Target

    5 Rules for Snort.doc

  • Size

    49KB

  • MD5

    62136f5df0820cc715dd2588c1449393

  • SHA1

    56a93d6cd44a612c054522c3adcb77f3b117b300

  • SHA256

    2e1136a2bfddb108cd3b3a60761113797265b281085ae35e185a4233d2e75d8e

  • SHA512

    e34504e3f131c0209c55da3411ec25380737e3d08a1021a9cde31691f5a533f60f1a3a0ccc364ef7b6a2e4c68d3edd0e5485559d1e0de899a9f6d2754fd1740d

  • SSDEEP

    384:K6nw8jaXLGkMFtv/2Su1Y5xAEO3QG9yhB+m9VvK2m6aj0jphRG:K64bG5xp89yz2jGh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5 Rules for Snort.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~WRD0000.tmp

      Filesize

      47KB

      MD5

      e8f45db00418a9fde04f9faffb7d6b60

      SHA1

      773ba95a0b22794e61f1851d8dc2ef3d0dd6b1a0

      SHA256

      48f40528fd5c39207d4739c4a5d1f179dad657715f1828a5c98da29f82c340f4

      SHA512

      fd5775782afe4cb1108878e04db0ccd4f5ade4fc504d7cb494a6e5c62cfd96331478554128dce243459f9d3042a34248ead6593450e0cee834a67fd55354c488

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      30KB

      MD5

      fa5d98549ecfe27191f3129a8e80e73a

      SHA1

      0655d0cc43fd3ba44b2a46393a1f9b74d1f355f5

      SHA256

      daaa9a516875a9bd618884a0e7f5ebeee2e47fd829e3f1b00f34d6884dce4a9e

      SHA512

      6d6f07d60b12632e242f2e8f8cd7a78b9f8ffb3d4787f18044a5b5801c0baf487544bbcf2f012e4d3fe390beb54f21495134a249c378bfd465a6290f72329e0d

    • memory/2700-31-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-33-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-2-0x000000007134D000-0x0000000071358000-memory.dmp

      Filesize

      44KB

    • memory/2700-25-0x000000007134D000-0x0000000071358000-memory.dmp

      Filesize

      44KB

    • memory/2700-26-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-30-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-0-0x000000002F351000-0x000000002F352000-memory.dmp

      Filesize

      4KB

    • memory/2700-8-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-32-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-29-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-28-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-27-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/2700-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2700-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB