Analysis

  • max time kernel
    99s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 08:11

General

  • Target

    TaxXinvoice.docx

  • Size

    10KB

  • MD5

    0280da14a9c30f3a8fabc835cff76ff7

  • SHA1

    d545b4b433e69fcc8659e658e9d4d7cd9e279b2a

  • SHA256

    e7a224a7b64351a65ea657f2382500c5a5b6f52acb3771105f3f73ecd1245c40

  • SHA512

    340044a30f55b8fa2a2469738f0ae7a93313f792142fa2473434dc9e50e044a049919373be44cbc9b2e73a33e2cc10571c59ac4519377c799f4d59cd62f6ad1b

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOeml+CVWBXJC0c3Ze:SPXU/slT+LOemHkZC9M

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\TaxXinvoice.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:580

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1A922912-908F-4FBC-ACE9-95E1C849BB94}.FSD
      Filesize

      128KB

      MD5

      38cf8d1c40b4c675416ba21782da781f

      SHA1

      f77e757be934eead8ffbf0d886cff93977054b7b

      SHA256

      4f3a3fbdd872fbb7ad055b806720b775a8060e390ef039351136e765c756e016

      SHA512

      804cf139d14fee961f31f38846b792ec501a99291803763edd20e9a4bfbd89fef3b41bd43f21d8b465f8c256fbf03b1702f279561e13c0fcc94c613fb68e9cf2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      d38348ee3a27dcdcc1319392f3fdb2ca

      SHA1

      3dee49c91bf83aca23e5d683c93ff3ee097d638a

      SHA256

      c3594c9939d6ef006f95d0e186900c9a4fbe77f601c3478893cb39c8ed5763cb

      SHA512

      3bdcf4e4ed4c7818d9561ac9304dd78f5916cee1672e90e7258659c4f69a00386e88bd18608fc5b7b0cee4f79b3eea9bcdbeffe11d1459059ed327f95c0be8fc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      615c8bfa97a361f601dea771680802a9

      SHA1

      be3b21c1829828816946138ad7de22a501ca51b7

      SHA256

      0c0b25c8b8ad366d75e657b2e90aeae3931e63e0547838cfbc56e01a203ee979

      SHA512

      fa0b866976a790f40b6530690c3a91c7aaf911915f1de8e73fc07c9641b6ccdc6d3443738d42451cacf5c816c62997f57e6d9874e79b7b3e7e0c7fd07f092a54

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{7F0D4C4B-D6BE-40A1-93FE-160578D0CDDE}.FSD
      Filesize

      128KB

      MD5

      8a60d43f97d5ddd19bdf00b2c9342ff8

      SHA1

      90e05e130827ad40448796d87a54d226e85385a4

      SHA256

      dc794f55564a55404af9a1d191fd3bfea865b292f85767e7bfec2783eb9ec892

      SHA512

      29c3f343ec458535d45460116c931625d791b6b309d1e19f256b1aabcd1121620990f639f14c58ef305bd58379f36c2d4c8f465f0f225863740228534f449d59

    • C:\Users\Admin\AppData\Local\Temp\{A622971B-E3F6-4280-BE0B-85E46B8A4A78}
      Filesize

      128KB

      MD5

      4265e0bc25bba5a912558f4d1d17b0e0

      SHA1

      71f96b18e6037c2974ec064790599611c1cd2328

      SHA256

      59f4e72ff5035d1f7fd84b501c0c42a7edd28c3979e3d4f424a5d13c663dbecb

      SHA512

      17e8c7673a05d66507f8ec6b2dd7e6838457138a52a5b3b4a4194c5760cd3740fc8e8522a71480b340e04f70f22db5f7ef38cd394c042d1295c2a189b2da0706

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      57ea92277dd6b693bc9d2ef2e2ac1711

      SHA1

      89cc1b8ad10910bd55dbd06f5a27187865319b93

      SHA256

      da49d1835f591c78e7eec7801b7941ec279ddc4dad523b774c46524c8f8f6838

      SHA512

      373e3ab61de02a8713b1a11ad3c1518ad2e8941eb5cd83f9f9a856d04f261851949069c558356a9d53c3a28ef7c8f5fdb589faf1f3b347ca560ed297ecd5879c

    • memory/1064-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1064-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB