Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13/02/2023, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
Document_2271_Feb-08.one
Resource
win7-20221111-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
Document_2271_Feb-08.one
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
Document_2271_Feb-08.one
-
Size
167KB
-
MD5
13edd903cb382434a64e08888818162e
-
SHA1
ffd40637266e85effc83a392cb0e3826e9df1e34
-
SHA256
12967c80237e6d4eb19643cb8e365735e4ae6277f2457ea4e204a767d77704b5
-
SHA512
45bf161f7e605effcfb8e110e347cb79eb1bde128a67a48fd08404b338ecfabd277a604d687b20f17de316533c9603b6447d3c4e1bdb66ab4570031165f22c50
-
SSDEEP
1536:Aalrx8RL86fZ1i7oGSB3u3QBhEFy/1Kp///Bgf0XAnEwwZIyFzTexE9PlY44P9xv:AyWRHGohBeQYy1URyVy+xQCxFJl8DMmo
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2010 Screen Clipper and Launcher.lnk ONENOTE.EXE -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE ONENOTE.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log ONENOTE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt ONENOTE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" ONENOTE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote ONENOTE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel ONENOTE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" ONENOTE.EXE -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\ONENOTE.EXE\\3" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4A6D-83F1-098E366C709C}\1.0\ = "Microsoft OneNote 12.0 Object Library" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4A6D-83F1-098E366C709C}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\ONENOTE.EXE\\2" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.0\ = "Microsoft OneNote 14.0 Object Library" ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1536 ONENOTE.EXE 1536 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 992 ONENOTEM.EXE Token: SeIncBasePriorityPrivilege 992 ONENOTEM.EXE Token: 33 1536 ONENOTE.EXE Token: SeIncBasePriorityPrivilege 1536 ONENOTE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 992 ONENOTEM.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 992 ONENOTEM.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE 1536 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1536 wrote to memory of 992 1536 ONENOTE.EXE 31 PID 1536 wrote to memory of 992 1536 ONENOTE.EXE 31 PID 1536 wrote to memory of 992 1536 ONENOTE.EXE 31 PID 1536 wrote to memory of 992 1536 ONENOTE.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\Document_2271_Feb-08.one"1⤵
- Drops startup file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE/tsr2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:992
-