Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2023 16:23

General

  • Target

    55066756eb5b31eaf5b403b5c8e2578fcc42f030af664ea7aa2bb7d9285e7945.docx

  • Size

    10KB

  • MD5

    2f1d7d1c6a4ac4baab35d66d028fd45c

  • SHA1

    a55ecbd8553b44f1eebe3e414179cc1e0824834e

  • SHA256

    55066756eb5b31eaf5b403b5c8e2578fcc42f030af664ea7aa2bb7d9285e7945

  • SHA512

    910605889f126872b94538c8d4d9beeb1795b78b3ff9f89142789ab76add819f0f14da82e47971206cb2a2eade68cd8d59ee0f489853f80c2eefd928ce95d67d

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOmXl+CVWBXJC0c3eu:SPXU/slT+LOsHkZC9d

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\55066756eb5b31eaf5b403b5c8e2578fcc42f030af664ea7aa2bb7d9285e7945.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4147AD0B-132E-4D6A-8CE3-58A533892280}.FSD
      Filesize

      128KB

      MD5

      36cee640507eb581b4206ad5f42b3a08

      SHA1

      cd4091e52d9aa1bc6bf2b469958da84d35c911d6

      SHA256

      99d1e07c06b957c8af54e7eddf891ba246a496cd1d0533655994c1fd44eb35d4

      SHA512

      a4bb903ba689f679d8743e6d04118d79f468b19e0f3728422bc39e32aba62fbdb619146ac78890a7daab183b85b6414bce70b2e8d828df34fc87bb179723018d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      98da78f025ce0d819bdc518efbc2ab33

      SHA1

      374de7aa3061cc8911cee4b96f0aea6ca180cad3

      SHA256

      55b7aec24cd5b84229c564ed342dbe373a6da650a81a6ec506e6076645beb2c3

      SHA512

      dc5a6fd74a553b9771cfb57d269cfb78380cd843eec8c953d49299109d6fbf0fa6e4b36de633d347e3faea5cf98e4f03985eec81175b1120cf6c2e4ad06e9599

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{88116A7F-D89E-47F7-93C7-75E48C5BC6D4}.FSD
      Filesize

      128KB

      MD5

      e1396ab2cce0eadfd9f9e1c6b57045b0

      SHA1

      03835eee6b300b5893b313909cc01d926d3069ee

      SHA256

      21b9c233adad14e7e6765111f9819a851815f305501d0df6fd32b4ca3131b82a

      SHA512

      434cd85cd05c713d2557790bb495ecb7be0a2a2fce97e6f365337cfe5c1d415d4b34a105b4f33ac5e8ddb67b91cd51da7e2d800e848848e645d6bc442baef4c8

    • C:\Users\Admin\AppData\Local\Temp\{A6125624-988C-4E09-85FC-45BF6FC59DB5}
      Filesize

      128KB

      MD5

      aef3f2690d55f18de94cd832ba8b2d1d

      SHA1

      9d83b26e50702853903d1bf667435c95b050b361

      SHA256

      9a07891870c02e78c00bad94d8862ccf6d5e070c5837f25df8dd099562749114

      SHA512

      847fbdee896759954eedb1f9f8ad13d8541c52dbd17510ef1d3850049a1874ebbe9e3e193f5c60cd08657279b9a131ecaacc22a1f48174292c7b000ba2967138

    • memory/1512-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB