Analysis

  • max time kernel
    102s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2023 13:05

General

  • Target

    Purchase Order No7000008677.docx

  • Size

    10KB

  • MD5

    be91688259bce9e527e03f71f38e72e5

  • SHA1

    12b1cf1e8d1149734395038ebca455fe108c8ccd

  • SHA256

    b50859d6de2a8b9c85dd84f0b19a956ba2029fd833639f20226baefb8b82ed0a

  • SHA512

    57ec3e24eb6518229e72be959934f89907c6a9b4e3c06022a09abb168673a386b3b8b31006b2e8019e61f1a7021a032433b9aa3690b5e0669fdfac6b9711d347

  • SSDEEP

    192:ScIMmtP0xfUW70vG/b3kgOi4OYTZus+1pReDnc37+Rl:SPX+si10ni4OY5yeDnMin

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Purchase Order No7000008677.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1460

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2CF3BA7E-7159-479D-9600-8D4EEBB2AE05}.FSD
      Filesize

      128KB

      MD5

      d1ad440694cc49468533ab834ff89138

      SHA1

      3debda5fa8db532a56a5c4ff5ece4cf61f65623a

      SHA256

      c61cc878a04b9350f2c967e915b94de90dfc10cec582ccb549d5abebf2663db1

      SHA512

      c9915808e7a5f0fe7295a4bbc7504d0d111eaabe641ed53a95bb74db56f58f099b188daae0f4ed94aafb8bccec063183009997c054b3a0c468e56da6b5851c2b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      9cc1edb5b372756c236b776cc6c17116

      SHA1

      df4acb608805c9f82c4653aa81614e4fb6bd9c59

      SHA256

      11a55eed555efc2d0af82d88bad6d922089094fa47cb24a259edc5a2ec1a3fa1

      SHA512

      b412e9bb8e4efbf128e98951b5a7d3cbeb5671167d5f6c36394be69276f0ce77504681d7b27b6d5f82d5914a6cef17f06f6a1b7d6a96592a08e7c4d6af4d5ca2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{683078D9-19D2-45E5-B79D-8669EE9BF839}.FSD
      Filesize

      128KB

      MD5

      6e809864e654d22e9710bb9bba9c90bb

      SHA1

      170b3c7d1516d02dff227b225dc8f9c9e24933d6

      SHA256

      a457107c1b10772248711cea9e562a46036297b4a43afc686c876f08e36ce5ce

      SHA512

      678b3ab258bd30ff2294015ef532913a7b590155009fe493628e4f5702a66f97443d2c8eb7737e9f4d157f7f2721913288f52327b27059891d88beb0ab5e2832

    • C:\Users\Admin\AppData\Local\Temp\{AB611459-9271-4F00-8BA6-46906B6B7BF9}
      Filesize

      128KB

      MD5

      fa0d2af5426f65aac67bf751ace08527

      SHA1

      71313df26e5b2ea97ada6c60dc43676ec5e6c1ba

      SHA256

      d986490c581dbfc846e98edfeff86c1b6a7a6fe746fa5c737b5e8be15153c5da

      SHA512

      7cf7dbf0f50876ef8960722a6df6e5ab2ee02eccc07389c81512321e9561b8e202a0a36995a0e093b5f32398fbbd70839d76be67cd8575bcd5bf879714797231

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      57c22fe9fa753625b145f995ed4be3df

      SHA1

      5fd772edb3599cf64235b12ac70238cd14ae2c3d

      SHA256

      55afb3ec02c7c093dcc615110ffc833eefd1ebcbf98f8bdfd228644391a312fb

      SHA512

      7dcc390b805e88c4df2af03d40370f7791ff6dc5e7d6302aa67c5af25812669458a2868d3b4b9c003f064e9966261c99a0f881794c3d40518c7176ef7f068795

    • memory/1988-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1988-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB