Analysis

  • max time kernel
    157s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 21:30

General

  • Target

    4807a5443c8d0f118221fdb8d183f473.docm

  • Size

    207KB

  • MD5

    4807a5443c8d0f118221fdb8d183f473

  • SHA1

    2bbf2276294da53453710e688712e36f971cc9a5

  • SHA256

    a949e11e4eba55b9cf6b17c195020fa33f66b5fd2fb9190a87cbaf1dbc527b02

  • SHA512

    38876c4706966ddb745aeaaa9bae4ec5b91ae46d93501c6fa7888e966b5204b80fc38271a4b36f2333bbe78966602a10911a3efa882468d91897abc94c82cff5

  • SSDEEP

    6144:vHbHtzJky3eEGVdajJ66tAhUJOO3NNzxsegZ:fzjkyuEGfMuhU7X1Q

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4807a5443c8d0f118221fdb8d183f473.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://spamchallenge.msftemail.com/XZGxBeE5FTTFTekl6ZW1ORVRrbDZibkp1T1ZaMVYyNWxiVTVzZVZkR05FbDBRMGRZYmxSTUwyZG9hR2xPTTIxdVNESm1lbXMxYWtoRFdGZE5MMGhpYlhoQ1dIRXlNalZyYjJvME1EaFlkbGhrTlZKb2J5OVBZakZ2YVVoRFF6bDNhblYzWld4d2VqbDRObk5vVVd4a2FYZDZiVWczWlZwSEwzcE5kVzFwWkRKdlRVcDZObTlCYzFGTE5HMVpZMnBxYTJwd2JHcHlNbFY2V2xkcmVGWktiMFJTTldwM2NpdHBOa001ZDJNeWFVeHFTa2hyVjFOTVFWUnJjRlpDV0RWcExTMVZNRUZHV2xKelZXUTNjR0ZITkZaUFVYbzFhekJSUFQwPS0tOTM0Mjc0ZDgzNjMxMjAxNzJmZmNkNDcxYjE0OGZkN2YxMGYyMWMyMQ==?cid=1358712581
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1680
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1600

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
      Filesize

      1KB

      MD5

      55540a230bdab55187a841cfe1aa1545

      SHA1

      363e4734f757bdeb89868efe94907774a327695e

      SHA256

      d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

      SHA512

      c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
      Filesize

      1KB

      MD5

      55540a230bdab55187a841cfe1aa1545

      SHA1

      363e4734f757bdeb89868efe94907774a327695e

      SHA256

      d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

      SHA512

      c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
      Filesize

      1KB

      MD5

      f2a7177b141a80c4270da40d213df634

      SHA1

      7ebd6a9b793a8694ed74eb6e1a104f007832c40b

      SHA256

      875f1f2c5d040a7b3b94365dab9285f7a5f980ffa57653e30626a4d63f652f0a

      SHA512

      828325036a58ef6a7b26a10fd8e24c3dd44db12eed18c918858b91e9b2134e0f20030720fe4df898dc8c934da9859223559859871472402319fd9204206db71e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_E3AAD38D981108133736A437FAB2E7C7
      Filesize

      471B

      MD5

      87558ebd1b8815077d1b0014e91bd6b4

      SHA1

      b2d28e4a0a46e9df76c7fce9847d01e3ba348bb2

      SHA256

      c76b7264b173195e8f5ed6aff97ee5eba9b640606f976d838ace781bf934ac35

      SHA512

      bf8d3d1f6c8fbea384b2eb2b3dcfbe22c751c89ff13d0ae4155ababfc1a563eaecbe6235d458b56a647da04c9aa34b0e4248217f6de2b6ab4c7da432a7cac386

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
      Filesize

      1KB

      MD5

      d854820d3bd82f640e0034aab23577a0

      SHA1

      6af83f7a1ff65cfc5bbc972852f507ec5483497d

      SHA256

      40574a3d8cd926832f3413f93d16a031f49524c4dace709054ce8fde45b0e33a

      SHA512

      f035c406f8f64768022bee927e1aa026d4ec1124c51396f27b2c4f41179fdba9ba562f382bac46b04ee976b5bdd1e2cfcc86bdc2a41fb79def5047630a0e18d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
      Filesize

      1KB

      MD5

      e34e4ceea81b2b988eaa47991d858e72

      SHA1

      be9163e5e6e5f59354746911fad87279b6d0c8f2

      SHA256

      4881bd0c92b169abeaaadf878c070e54b9345bf2b154edcc3fd4a31f8b653a37

      SHA512

      2261d679305319dedfa8c6cfe799c8bc25224eaff70dd0edfe8d7e79d7260a2f5909421516e193aedd6c3822e41828d08b44cb873424fd95910c7d2ceead14e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
      Filesize

      230B

      MD5

      d3f53c72b5ddf7e3c1dfb06947da05b7

      SHA1

      f9eb0d015a31f51ee681d1b09295e4ed83b90045

      SHA256

      3b9278a58c00901f90486d391c26ad49d38f1d4cf856b079a3c42ec6f9e8d851

      SHA512

      de37822d0394a1175745ab4be456660556947aaf3445e7571e420b1f8a7134025888878406312f3e7dff33e27b3d02e51896c17eb097b28312ba1767422df59e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
      Filesize

      230B

      MD5

      d3f53c72b5ddf7e3c1dfb06947da05b7

      SHA1

      f9eb0d015a31f51ee681d1b09295e4ed83b90045

      SHA256

      3b9278a58c00901f90486d391c26ad49d38f1d4cf856b079a3c42ec6f9e8d851

      SHA512

      de37822d0394a1175745ab4be456660556947aaf3445e7571e420b1f8a7134025888878406312f3e7dff33e27b3d02e51896c17eb097b28312ba1767422df59e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
      Filesize

      442B

      MD5

      946d2156fd69dc9dac2da97237b35de4

      SHA1

      10d756117366e8603fb5a265955dae669ce9d812

      SHA256

      d76a09a9e38fc6dd48da37b2c78e0c16a69bed8131fdf8b7e23a971b21dff360

      SHA512

      88dc7e62309fa97a185b57dcf0c03beec4c59c791c291855eba74987589746f8741c0184b6c507dc6493775ac6d5d744a53c38a0c0bece44707ede2bc55c5560

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_E3AAD38D981108133736A437FAB2E7C7
      Filesize

      444B

      MD5

      477e2e9ad460fd2f95cd170a5c3884c7

      SHA1

      7a8862a505625712a8054afdf313bbbba6a7e661

      SHA256

      68b8fd40306f7c9f39f4586e67de1a9c9b26d537395c19781667ca5002695391

      SHA512

      128d68d8cd8675f485bdd8f6159576ea94c62320284da3ba5717b6fb3070c27b626b0396458d1b63e54f37594fb944f9a6ba9b04389b191a3a44bbbbe27c001c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      977bc042c9fe47ec24a6d7771f5e16d1

      SHA1

      7dfdb18c11bcd4f41bbc3bb43d659c66f2a1f805

      SHA256

      4078e7f0b7b14062d40df85ca4fc0c3fdddea271810c05d381d800899f6994f6

      SHA512

      18ee1cba6a386f334a352994891bf6e96e5a0acb132607033c983133c19c3594f274fe68a16bfd7679f397af75ee451992e7971746ce683efdf6f742e9ac2c29

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d03a855594d6a07b536c004cc603b9ae

      SHA1

      0f0bb2dd51b34db8d72578108ae77ccb88fc168c

      SHA256

      c1c289e67b11d2a24c36dffa86fc870c629f96f79fd0545a03bd79a0432812da

      SHA512

      28626d404b1be13085b440d413f9fae70912e764e6a8280eece9d6f6b9b5d217830570f776b73ef292354ab2cb5f83154e019c0ffba14b6bf681d801eada1922

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2b57f5c934c7ae84bad2da0e5f11f7f4

      SHA1

      ee6d24f9512ec57853252b43fc177abe17b8bba3

      SHA256

      c3f74061af3be68df9da79e04364dcacbcb036445bff79fb690b6eb8027e6519

      SHA512

      9987337643500418112c2ef8b7db5a07cd26455663ca565dc25645f35b4a76146a15d0bce17e6d270fcd6d8d0edc38859299a6339adf00f89ecdb65697759800

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      69d79ff2fb92679eb942f772db3d441d

      SHA1

      b9061f8c53805de5f3dd92f28c9723886246c564

      SHA256

      cab95ebb819bda850900f69973deb3be312724e2ec7827e1bf5cf155648f18f2

      SHA512

      74c662d2308d19bb61391a519db59a944bda03b3df8fa9910010a05c0a8070f378d2f2bd2aa2a1e49531c58af68ebaf792a60794c6eee1fa37823a0d1749f626

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3cf92153d0831c9b0e766354163476b0

      SHA1

      f98f385a22cb3770333b21c35a6173db5ab1e4b0

      SHA256

      2b63dff50c66b07ba2cd1090cd51ea0ae166c9135c88c3e8e2b561c6f17b8d61

      SHA512

      0f79e957fb45caffb3d206deea0e67300fa4b292fdb9e0963314cdfb7834be3effe10d4360302e3f8925a53f3afb3de828a4570460a48a2bf2131d3cdf99ac38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      61105750284606c6e785fedc68d3d0ec

      SHA1

      cc160bcdfe185299d3c6d5b4c508b54f96f69e26

      SHA256

      396f8ac9c1ed46b1628f8e284bc38595c40b19c9d4111b8162a649e519e07a61

      SHA512

      6e5e4743b27d9099cbd8ece211be71e0d51a551c3d671e63a3e2a742b4f162269c002b4d6f26295044111022a489f1b09cffdb4dbb3ccdda99db725f2d187fee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ecbd95b72c3594413427d143f8a73a60

      SHA1

      669afc6a8354b2e0dd9adec3ee1927caad86f2b1

      SHA256

      0d2db40fb2013da6f35d05cdde92bda56d365934ea3f80132461a08a5d1b4323

      SHA512

      681dbb56fda56e7edd50d1d6490b2911c574e6a2ba4b2efd4494f2761e32613efbd9426f24d7776828c76d0c833b35cd914d0e8d7b52a15e4a11f8ccfe017490

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
      Filesize

      458B

      MD5

      9d2ffdc9bc31fd76258bb6ddf2cd142e

      SHA1

      6c4cad17542ab8ce6a2af9a146d34d8dc072ec3d

      SHA256

      f79bbf1e06e4b0da0480f289dab8ac1bd43983772cbff9dce663747c82c7d68a

      SHA512

      218fca7c785c4f1d7862285c08516dc2a95fbf3c8f7527ed22c39131d7c72287ebbd4bbf331a963f393497fcedac2d1981716aba4cadc530983c91b50f98584f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
      Filesize

      458B

      MD5

      9d2ffdc9bc31fd76258bb6ddf2cd142e

      SHA1

      6c4cad17542ab8ce6a2af9a146d34d8dc072ec3d

      SHA256

      f79bbf1e06e4b0da0480f289dab8ac1bd43983772cbff9dce663747c82c7d68a

      SHA512

      218fca7c785c4f1d7862285c08516dc2a95fbf3c8f7527ed22c39131d7c72287ebbd4bbf331a963f393497fcedac2d1981716aba4cadc530983c91b50f98584f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
      Filesize

      432B

      MD5

      6cdac8c905d9d50f54f682d11fc38393

      SHA1

      f043dab1aed1842242ad70289e26774953ae93bf

      SHA256

      7ca22c61a12fb350c9dda5af1c1f760761fa00af6bead24257d2cb5c3ec97ef0

      SHA512

      a8a473b7a406667f9ac0fa815732bd2c47fa3362fe83d97cf928fd267eee979ce272fe31a9d8b112ff64c58298b866f3b6f35ac98937c4ea5eb689aa13a817a8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JMMJVZS5.txt
      Filesize

      608B

      MD5

      b8391f6ac9548e241297fcb0b04bf6ad

      SHA1

      0c412dd02e7c25af169c65ceeac2dfd606b221d5

      SHA256

      1c96a8defa54cd3b38ce232e8b278bfb851487b9736edd2bf70fa945d88dad1f

      SHA512

      5ce3e6a10e9153e3334e49e780bfc7b5d16e2e78ff1bf6d6d8bcd5e94030db624be7335dc267c2177ba597a678643c9e68c786d16a08a28d6a3ab1cc1505a6a9

    • memory/1208-61-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-70-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-64-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-63-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-111-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-62-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-65-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-110-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-100-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-90-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-80-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-54-0x0000000072801000-0x0000000072804000-memory.dmp
      Filesize

      12KB

    • memory/1208-60-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-68-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-59-0x000000007126D000-0x0000000071278000-memory.dmp
      Filesize

      44KB

    • memory/1208-69-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-58-0x0000000075C21000-0x0000000075C23000-memory.dmp
      Filesize

      8KB

    • memory/1208-57-0x000000007126D000-0x0000000071278000-memory.dmp
      Filesize

      44KB

    • memory/1208-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1208-55-0x0000000070281000-0x0000000070283000-memory.dmp
      Filesize

      8KB

    • memory/1208-66-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1208-145-0x000000007126D000-0x0000000071278000-memory.dmp
      Filesize

      44KB

    • memory/1208-67-0x0000000000417000-0x000000000041B000-memory.dmp
      Filesize

      16KB

    • memory/1600-141-0x0000000000000000-mapping.dmp