Analysis

  • max time kernel
    101s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:45

General

  • Target

    29679c3d1d985786a8ad34e030bd7f176c8d37d5dc330b0504f6bab0a9ae5f13.docm

  • Size

    95KB

  • MD5

    52529bbf6d26efe16c174105d185a0b3

  • SHA1

    70b9c51be78edd4e1e925f30ff71177c319321ec

  • SHA256

    29679c3d1d985786a8ad34e030bd7f176c8d37d5dc330b0504f6bab0a9ae5f13

  • SHA512

    0184b37e60ab10cbbbb6bc1aabf9b8030268b98856c4e60d1ec142b077900db411a7c85213f257fc3d32ecfa805d8b971c3c72bb47786bdcaaef6a53caee979b

  • SSDEEP

    1536:5E2QQFkbsI6OamYt6Wdfb5x8+cQe7c7qMMr0/QUHfrhxO1z9J6UtAebABSNAWy:U5V6V6yVK+c7kC0oUDhx6z9J0ebABSNy

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\29679c3d1d985786a8ad34e030bd7f176c8d37d5dc330b0504f6bab0a9ae5f13.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\programdata\xml.com
      "C:\programdata\xml.com" process list /format : "c:\programdata\i.xsl"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\xml.com
      Filesize

      386KB

      MD5

      a03cf3838775e0801a0894c8bacd2e56

      SHA1

      4368dbd172224ec9461364be1ac9dffc5d9224a8

      SHA256

      132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

      SHA512

      b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

    • \??\c:\programdata\i.xsl
      Filesize

      1KB

      MD5

      9a494186a6c0c1da551a10aa697e9293

      SHA1

      6a7cb4b4ab54cd8e95fc6c6060816e31d08917db

      SHA256

      f2613c696b4e781296ff5779f3c1fa45281be88e6203a901e10d17cd4f5efa27

      SHA512

      2c396514d078ebf763b7f3269b96b940d1210654211a477d868ad7b42fc3546b83ebb53358752655a0fc6c41e2c735b950b5bd359d8d68b8d98cca5636e18cbe

    • \ProgramData\xml.com
      Filesize

      386KB

      MD5

      a03cf3838775e0801a0894c8bacd2e56

      SHA1

      4368dbd172224ec9461364be1ac9dffc5d9224a8

      SHA256

      132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

      SHA512

      b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

    • \ProgramData\xml.com
      Filesize

      386KB

      MD5

      a03cf3838775e0801a0894c8bacd2e56

      SHA1

      4368dbd172224ec9461364be1ac9dffc5d9224a8

      SHA256

      132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

      SHA512

      b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

    • \ProgramData\xml.com
      Filesize

      386KB

      MD5

      a03cf3838775e0801a0894c8bacd2e56

      SHA1

      4368dbd172224ec9461364be1ac9dffc5d9224a8

      SHA256

      132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

      SHA512

      b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

    • \ProgramData\xml.com
      Filesize

      386KB

      MD5

      a03cf3838775e0801a0894c8bacd2e56

      SHA1

      4368dbd172224ec9461364be1ac9dffc5d9224a8

      SHA256

      132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

      SHA512

      b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

    • memory/896-58-0x00000000714BD000-0x00000000714C8000-memory.dmp
      Filesize

      44KB

    • memory/896-57-0x0000000075E31000-0x0000000075E33000-memory.dmp
      Filesize

      8KB

    • memory/896-54-0x0000000072A51000-0x0000000072A54000-memory.dmp
      Filesize

      12KB

    • memory/896-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/896-55-0x00000000704D1000-0x00000000704D3000-memory.dmp
      Filesize

      8KB

    • memory/896-69-0x00000000714BD000-0x00000000714C8000-memory.dmp
      Filesize

      44KB

    • memory/896-70-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/896-71-0x00000000714BD000-0x00000000714C8000-memory.dmp
      Filesize

      44KB

    • memory/1164-63-0x0000000000000000-mapping.dmp
    • memory/1476-65-0x0000000000000000-mapping.dmp
    • memory/1476-68-0x000007FEFC101000-0x000007FEFC103000-memory.dmp
      Filesize

      8KB