Analysis

  • max time kernel
    119s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 08:48

General

  • Target

    1799c8fcda056ec1bb545f7cca3743c2.doc

  • Size

    51KB

  • MD5

    1799c8fcda056ec1bb545f7cca3743c2

  • SHA1

    9cbd3ef55ec0044e27ed1f2356990cc766b89ffc

  • SHA256

    d9b52e89476da47de66a850e82e35c63b142633dee8585d6901d6c41dd2ffddd

  • SHA512

    525cc38c6aad0329a3a4d261c94201c53cd62adeb4b80045e30946a0d0a48f91cb87406a17bc2a9889a7a8048429596561ea654554589b32a644939b83c4810c

  • SSDEEP

    384:7+yatEi1aUf5D4YrDzsfyGcSxwAjLWarHOj6eX0jdoutQxOm:Cb9aa58YrDwNfRrI31

Malware Config

Signatures

  • Office macro that triggers on suspicious action 2 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1799c8fcda056ec1bb545f7cca3743c2.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1556

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1799c8fcda056ec1bb545f7cca3743c2.doc
      Filesize

      63KB

      MD5

      67d02e46ee60d98f7a945cc28926037f

      SHA1

      3e2ac43b998b4318d8e612e6f442c6077594b8c9

      SHA256

      5d9c63998fb4bed6ec3e756b2da659498d9f104462f652bcfe907fb1eb44c5be

      SHA512

      72454bbe50a6735b7672ffffb4a9bf92fbf385efb8adb7d078bd23abf6bbe95f8416c554c43b67683139354e52f4254c9abf4f42e6a49e226aef93b4586c3fbd

    • C:\Users\Admin\AppData\Local\Temp\1799c8fcda056ec1bb545f7cca3743c2.doc
      Filesize

      56KB

      MD5

      9b76bb1c3ad54c58d185387cb276a903

      SHA1

      e10a7325c343e44dfe230dec7752b5f5e5b2d106

      SHA256

      6a4be590d9aeada01d8fb8a7ccef0c32911addc4bdddf1e8e2d8ef2db72fa201

      SHA512

      335d317de9187f607705b457ebf2752f3ff51c07158eeccf1d441dc5cd990f6e9b41d93fe3b1367adbeb50bc1274165eac6683d1ec8d545bb1558f411b7746c7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      25KB

      MD5

      8d2d2b5bf6b2ad869de5e764356056fd

      SHA1

      9b5c796ef6042304c0992f402c19366f0326abf8

      SHA256

      5ea23b2867eb788662d3f4cb21d6467f65217bee4750363d44dd285d3c2192ee

      SHA512

      b7c93ae2acab33fd95a93cbd47dc1a72cbc204ae56c2321ee363d8cf45482584a554cc0f80160ed7f267c83182b2f48a834fb56cfc1271487087215a6933c3f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      27KB

      MD5

      003ea386cdb529e36f0e4393f20244e8

      SHA1

      0fdaf731f73814c1c51d9b0eebb7840246c15997

      SHA256

      786fb9dc0527f48221a97d55315c69b966332e8354ecd22662d290877cb6f321

      SHA512

      750ebc8b684df480acf2432252fe1a272b2b34467db21a08266a3df6c0632c6cb0df7b3af33db23ef64bff5edf7d15cf8b516b7d77b4ddabd69bd8c8731fce4d

    • C:\temp.tmp
      Filesize

      2KB

      MD5

      bdd652f6ded4b7b168ab1cb5b88b4c67

      SHA1

      fd307f0a241f7b5caa19d119f2263a6fac93a494

      SHA256

      cee88242c9ab9eb1e846fc7697e58434bc9587c7639a27ee1a8cf8d95c3a4c8f

      SHA512

      0ee6c3061db540abed71aad37f3b8aa5f212bb8a785ca302ff15966e2debaadc908b5dc0ceb9442f23dd2d7d45492e2192bd0ecd84c2aec4153a94b2375848e8

    • memory/1212-109-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-112-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-63-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-64-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-65-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-66-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-67-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-68-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-69-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-70-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-71-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-60-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-61-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-107-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-108-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1212-110-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-106-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-111-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-62-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-113-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-114-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-115-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-116-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-118-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-119-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-120-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-117-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-59-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-58-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-57-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-169-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-170-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-171-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-172-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-173-0x0000000000740000-0x0000000000840000-memory.dmp
      Filesize

      1024KB

    • memory/1212-180-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB