Resubmissions

08-03-2023 09:30

230308-lgp5vsef5w 10

08-03-2023 09:27

230308-lew6dsef4y 10

Analysis

  • max time kernel
    103s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 09:27

General

  • Target

    Tax invoice.docx

  • Size

    10KB

  • MD5

    0280da14a9c30f3a8fabc835cff76ff7

  • SHA1

    d545b4b433e69fcc8659e658e9d4d7cd9e279b2a

  • SHA256

    e7a224a7b64351a65ea657f2382500c5a5b6f52acb3771105f3f73ecd1245c40

  • SHA512

    340044a30f55b8fa2a2469738f0ae7a93313f792142fa2473434dc9e50e044a049919373be44cbc9b2e73a33e2cc10571c59ac4519377c799f4d59cd62f6ad1b

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOeml+CVWBXJC0c3Ze:SPXU/slT+LOemHkZC9M

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Tax invoice.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1780

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{73CC1A43-5FFD-4ACB-8B3C-9C0D12116926}.FSD
      Filesize

      128KB

      MD5

      0bcf909072e8b2c5cb4b3931921de269

      SHA1

      d8a7fa7b2dead4598646b35a9cb47fb2aec70cf5

      SHA256

      09784eac5cd6d0a85f2c61101cb591a9494c93ae583079fbd37f967599f4782a

      SHA512

      b123c04134c39a91ad1062a31b12f24b7adc798a3a7d852479a073d60f7b1be6a2b03280014e9b2c67d49bf500a655eeb68ca2f78744986a2f572124e5676236

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      ecb0a196c62969323bdfb3717746f6eb

      SHA1

      60b224d41be7be8492afb2ec37850c49f7a0b8f9

      SHA256

      63660f2f083d0aca3a6d70e3964af19fc4c02d2e9c3d42626372d5e2e8ba6b71

      SHA512

      5e6848ab0bd21db1b6dcaa3ec9cd3aa2e70c77cca58eb7790296ff91d6d52366152daf04814e8e08230d1b0cb3eebc964f08ece8fecd2c7a720c35f3c551b002

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{E656D0F9-62CA-4006-BE51-F0DC1AA2616A}.FSD
      Filesize

      128KB

      MD5

      baeb2cab702b8490fc7b88355fdf9cc1

      SHA1

      6d9b3fac6874eb571eb1ea0193ff62ca9be89775

      SHA256

      851c7a97bdd3126ca789c93ab344d2423f5e94afe63bb1a220f9c9682ba8a8a7

      SHA512

      72bcc0a4f314b9c0e93edc4d438a0e32d5673c237ac2d8eba0b392a17f28eb8da1e1958a8600fedddb650b1aefd7dfcc9437086e3dbd6abe415f817ef9576e80

    • C:\Users\Admin\AppData\Local\Temp\{53478C96-770E-4EE9-B5E9-E71F7B76627D}
      Filesize

      128KB

      MD5

      c2d0533eb1f3f6fbd11508c2ea29bcaa

      SHA1

      11b48ada8f1d4dd348d318ff69a4ae6e26ec2813

      SHA256

      c127af4fee379ae694b507be79af7d423c3860df5c186942c60ce11ebede13d2

      SHA512

      2b8391d6c396ba707f96a85156ff9fee6ca7fba90718a0b0e6a25502fb2edf06603ee6af443c102b7697c6f9f2e149afdacfa7f21a18766cb42995b7e7b7fc73

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c057fdb22e345e3df8c2b21a352fe262

      SHA1

      134d9cd74eae3e516d848f4692ac5fe484768a2f

      SHA256

      1d54721921b9b70061fc24564f44c810252fb856546f23e442e5353dce6fc099

      SHA512

      e9eddf80b0572823412ff9dfcd792173671a5622b16641677d06f601a5e8caaf18a3d4821aae1e2b5dabeb85b9b0930a1c01d5579de0890e7ad7d13a0ea57e93

    • memory/1972-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1972-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB