Analysis

  • max time kernel
    424s
  • max time network
    400s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:17

General

  • Target

    sample.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1724
      • C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE" "WINWORD" "Microsoft Word"
        2⤵
        • Process spawned unexpected child process
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1620
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x2e8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1732
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1996
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        1⤵
          PID:1080

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1452-54-0x0000000072801000-0x0000000072804000-memory.dmp
          Filesize

          12KB

        • memory/1452-55-0x0000000070281000-0x0000000070283000-memory.dmp
          Filesize

          8KB

        • memory/1452-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1452-57-0x000000007126D000-0x0000000071278000-memory.dmp
          Filesize

          44KB

        • memory/1452-58-0x0000000075041000-0x0000000075043000-memory.dmp
          Filesize

          8KB

        • memory/1452-59-0x000000007126D000-0x0000000071278000-memory.dmp
          Filesize

          44KB

        • memory/1452-80-0x000000007126D000-0x0000000071278000-memory.dmp
          Filesize

          44KB

        • memory/1620-62-0x0000000000000000-mapping.dmp
        • memory/1620-77-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1724-60-0x0000000000000000-mapping.dmp
        • memory/1724-61-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp
          Filesize

          8KB