Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2023 01:00

General

  • Target

    Purchase Order No7000008677.docx

  • Size

    10KB

  • MD5

    be91688259bce9e527e03f71f38e72e5

  • SHA1

    12b1cf1e8d1149734395038ebca455fe108c8ccd

  • SHA256

    b50859d6de2a8b9c85dd84f0b19a956ba2029fd833639f20226baefb8b82ed0a

  • SHA512

    57ec3e24eb6518229e72be959934f89907c6a9b4e3c06022a09abb168673a386b3b8b31006b2e8019e61f1a7021a032433b9aa3690b5e0669fdfac6b9711d347

  • SSDEEP

    192:ScIMmtP0xfUW70vG/b3kgOi4OYTZus+1pReDnc37+Rl:SPX+si10ni4OY5yeDnMin

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Purchase Order No7000008677.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1316

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{422BB7A8-5E6A-4F4B-A813-D58458AF4FA2}.FSD
      Filesize

      128KB

      MD5

      e2c92a7de27499d03b407445776ee07f

      SHA1

      bc92148d02ce8c6fae3ff84148f8ca41de981aa9

      SHA256

      46e882e9e90996faddb94be8250a68090b58efed5f23f57d07c8cbb7db8b10d7

      SHA512

      a003e9fb3d780d1faaa761ef19faf076897aaec159b11f00bc0a67c9abebe2d30f6a015b95ad6e6fc02dd956270b06dea4bf462d28478d8499e9679cba383e00

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      69a112bd395c286a1e1024ead1f0a0d3

      SHA1

      d7d3a0de8f9e55a7039d5ea7d3e13800dfc272cd

      SHA256

      acc9661aedb0a2a36b410b2c7d3433e477c02e6db01cdd4470663b47f5cf3993

      SHA512

      3991db5c642803ef367cc6f1381f66c0aa51abaa8fd2ce35afc3c29f612ac0e03f0a5cce474b56d5a4d3434d4fc91b3fcb86c334edfb7cfbe95d3f2e5eab6dbc

    • C:\Users\Admin\AppData\Local\Temp\{9D8072A8-B931-4C59-83FE-30B19564F71E}
      Filesize

      128KB

      MD5

      fbeb3c588002f99a32d73a13297f7ace

      SHA1

      7157fe85eb6c8b2e086a69e4203a19cc265d691a

      SHA256

      22c18e4d135047fc22330c32303e32ba7d12963597122064fbe455c06d2787b7

      SHA512

      8436fd62c44ed45ff234c499ce2217838fc590468bb871f1856a82b168a7307eed0b090ac63e313a180f3a261b43a656587dde19dd265a801c0551677990a098

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      fbb828c12bc0688a7598bc6c6c747b12

      SHA1

      bdb34983708f1123a88d92d9116942c84136d045

      SHA256

      57cfba1df5eb84ef3f95223658b83fb36e530f40227d7427d13191b9e8baf969

      SHA512

      5ab612d68d781dc2c60f4226a0e497ccf5b0d54a01fa2b780adfe8a63b0d920e2b985b1f1c69a3064b43d612fe5581157cddc0e57d5462be6a29f75ea5ac6ae3

    • memory/1372-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1372-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB