Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 17:35
Static task
static1
Behavioral task
behavioral1
Sample
03b96ab568d5a4a8d53ee14b6a571bf0fd5de50b6db02555420de7cf3d9737e9.docm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
03b96ab568d5a4a8d53ee14b6a571bf0fd5de50b6db02555420de7cf3d9737e9.docm
Resource
win10v2004-20221111-en
General
-
Target
03b96ab568d5a4a8d53ee14b6a571bf0fd5de50b6db02555420de7cf3d9737e9.docm
-
Size
83KB
-
MD5
342eac015ea7361729f6fb1506ac4ef1
-
SHA1
e46dd99f1e3dd352abd161f1e8d61aebc062d6a6
-
SHA256
03b96ab568d5a4a8d53ee14b6a571bf0fd5de50b6db02555420de7cf3d9737e9
-
SHA512
6ae4ce90d9966f16bc5220c926ec29aab6250e4928f87201084e84269de2f748b6bb27da611751cd521299946e3050c0e8b277c3bb142adf2a44636e822fdb90
-
SSDEEP
1536:1mS1WExOoRX51j1BPpoynaSlqx1JxpHj3Sc7g2Qh8eH6LG/:AS1XRJHB2yrlqx1Jxh3Sc7g2Qh1aq/
Malware Config
Signatures
-
Abuses OpenXML format to download file from external location 2 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\Common\Offline\Files\https://files.catbox.moe/o7mgi1.doc WINWORD.EXE Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\14.0\Common WINWORD.EXE -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1356 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WINWORD.EXEdescription pid process Token: SeShutdownPrivilege 1356 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WINWORD.EXEpid process 1356 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1356 WINWORD.EXE 1356 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1356 wrote to memory of 1476 1356 WINWORD.EXE splwow64.exe PID 1356 wrote to memory of 1476 1356 WINWORD.EXE splwow64.exe PID 1356 wrote to memory of 1476 1356 WINWORD.EXE splwow64.exe PID 1356 wrote to memory of 1476 1356 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\03b96ab568d5a4a8d53ee14b6a571bf0fd5de50b6db02555420de7cf3d9737e9.docm"1⤵
- Abuses OpenXML format to download file from external location
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1476
-