Analysis

  • max time kernel
    100s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2023 12:13

General

  • Target

    PO_03012023.docx

  • Size

    10KB

  • MD5

    2f1d7d1c6a4ac4baab35d66d028fd45c

  • SHA1

    a55ecbd8553b44f1eebe3e414179cc1e0824834e

  • SHA256

    55066756eb5b31eaf5b403b5c8e2578fcc42f030af664ea7aa2bb7d9285e7945

  • SHA512

    910605889f126872b94538c8d4d9beeb1795b78b3ff9f89142789ab76add819f0f14da82e47971206cb2a2eade68cd8d59ee0f489853f80c2eefd928ce95d67d

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOmXl+CVWBXJC0c3eu:SPXU/slT+LOsHkZC9d

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO_03012023.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      58364ce13171ea7ef4156a3b81f75f53

      SHA1

      ae0e61ba04732ea542ffe4a05f98eabf4de7bd92

      SHA256

      1760fb0804b7e4f069ff35d102f2c3f76a72f751b67dfae8e48efef7e1be749e

      SHA512

      7687a52b50c68932bf011cb23054f39ee8f90567631d59ef6d857d6f6b980dbcc709ada0937ff13353b886fda806c9183a1928fa787f1604ca25c2f2daccd40f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{6B61E38B-C3F0-4BDF-995A-6F5925DB013E}.FSD
      Filesize

      128KB

      MD5

      f324f7aeab29be6c5d80499ee0a5535a

      SHA1

      b648939744ac9cba26cc4c709f09aa5f276a0f35

      SHA256

      deb8735b71fd05bf5fcd2183131bbc6b56657ce1744e7cd49dbaf9ba1651fb19

      SHA512

      3c4503ab36d98e722d687d0785302eb05c89099ddd350e98ed58cac7229ce66e5904690aacb28ddc7fc8570ae2be465b641fe0a8962b4c132fd7b254c24c3d14

    • C:\Users\Admin\AppData\Local\Temp\{B9A47450-6FDB-4581-99F6-8EA42D43749E}
      Filesize

      128KB

      MD5

      6c150a6616383fdfa34c32d33190fa24

      SHA1

      5c512a599d68007d08c526c7107a4937ae950b43

      SHA256

      1b5fcc8920aca2d97377f75fb1a05620e864f5302b4a13708425b5f28886fee9

      SHA512

      8a2c23499604f17f20118f9c115bd2b7305dea5ed9bc9a8a8577c0f82ee5502dcb51266c3862c50028f6ffe5f1789fa7ac7d458b9dd7247ee30a9c1a06e54fa5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      8de208141f4f7e2a2f80d74f93dd4df5

      SHA1

      8706989cec8befb93cc81ce46a948b166c6048ea

      SHA256

      6d43cadeb4809bb2420bee1778e3cd89668a08b8c7026e7c1583c4827ae910a1

      SHA512

      3a12e7e9f5322e2b78f2d6b12e38bbf4a767cd6cd805f0322f5061ed7cd52d22a6c00dc9536410f6f832f7c02c48763f196891826617ee3a47483587fb30811a

    • memory/2036-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2036-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB