Analysis

  • max time kernel
    409s
  • max time network
    412s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2023 13:48

General

  • Target

    RDM-inv#900399010 ORDER.docx

  • Size

    10KB

  • MD5

    c4f553758b3b0fb2c3466d4c09bfc9ff

  • SHA1

    24b290a5f4965637d00b5212236e46feb7a54560

  • SHA256

    324280b29e2831413f5e77ddbf2f84dc30fe06533915ba676175d3ed4b415cea

  • SHA512

    15f7a1eceb347af0fabddf7e17d9493452856625332810150b597faf31c0c15a328a6f7ccecd278a8d8808750100ed390877d04656bced9b151e0e9cd264ab08

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOVCZl+CVWBXJC0c3BG:SPXU/slT+LOVuHkZC9U

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RDM-inv#900399010 ORDER.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1284

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      005e86bca959abfa2c7fbed762a37e7e

      SHA1

      773b174b47529c487006692e6c387954a3f84b0d

      SHA256

      c0a3dcb281d8c1194cb11417b67e4bdb22ed6d8c4d53922ef4d9e5aeb104f2e9

      SHA512

      00067cbb5d9c05412d5c376fc0f7beadb486ee7fba30921a984d8e078e632c430d39371d040b6cc0038cc8a3757e34fd21b1064476cc1333110202126a01aab0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      cca61afe8a5e5cf2b5d9b7fe2ce49123

      SHA1

      85162fcfa15916166453f1578d79031111b26c33

      SHA256

      540f2d70b25c2ff8a1e394794b32e09ee018ade1461a13f93e7aac9fdb8c4594

      SHA512

      b19fddbc7a1a0d21c4fcb851a9c3f2fc56dbc693754aced71ce9fceeb05a023b63b6d0cf3b08b24cbcc72e2dc68c1f02fdc7daea6c7aef0d36f665daa3a30ecf

    • C:\Users\Admin\AppData\Local\Temp\{5B63AE5E-F9A8-4B95-AC84-F491F44B8DBA}
      Filesize

      128KB

      MD5

      a4c820f7e9217c96ad59be69dca12763

      SHA1

      1469a7b07b501bfbcfe905afa613989b335b63b4

      SHA256

      395b446aa5c3eab533ab6a42641230ee30f5e8150878745d20d4999af22bf076

      SHA512

      74808c7fbb81bbae2af3bb90caa01349277f91e02ce5546cd0e7a065dbacc91c8c29d6b9cecec8aa4984bcd15704224a23698cbcc9e883b6f668415242a247f4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      fa3c32eec038c67c6ad16f1bf10599a3

      SHA1

      a43561cc43565d7eb83f386e4c770ac2fdaed42d

      SHA256

      9c897b11b87b745b23443e8204a6c8626cd065c1ec9d96687076f292d6cac03b

      SHA512

      09f33785b3bff637b8b554d956d60413779a9f7561a0ec8f7a713bbb3af00b326ac2b785b7b65f762c6c0ce7e4c8e59ad735d0788ad6ebb6d451b1089d31a2a6

    • memory/1580-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1580-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB