Analysis

  • max time kernel
    108s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 08:49

General

  • Target

    24d5ccb296d91cebe59ce6d5e86ddc9b.doc

  • Size

    71KB

  • MD5

    24d5ccb296d91cebe59ce6d5e86ddc9b

  • SHA1

    babc81f66a331f702dbcad50ef0c67f74aea295d

  • SHA256

    360e739562353633bb735f2a4cfe5967e893599d910089aea319d4528ec9c853

  • SHA512

    f6cbe7283988e2a9002a7bc3fd4c8c932478488924f16536fae05973657c88af17a91c9148ae64105c6431819d483c0755ce4975d191fde3a6e6ba3e97a98ad4

  • SSDEEP

    384:xQDvTPAEFCWWWWWWWExByGcSxwAjLROJ/+rHhH8YBjN7sM90kteX0jSPtGUOEM:xQDv7Vux3fnx4pkWF8

Malware Config

Signatures

  • Office macro that triggers on suspicious action 2 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\24d5ccb296d91cebe59ce6d5e86ddc9b.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\24d5ccb296d91cebe59ce6d5e86ddc9b.doc
      Filesize

      83KB

      MD5

      05913c503834c784a062845af203f0b1

      SHA1

      b37094e40efd21e287ce7577a6ade287cc10f4cb

      SHA256

      0f2e73d0f27821d8dc4b79f507b5ef178dce7577540348d33799a3d8fcbec77c

      SHA512

      f95b390a5f7e701bdca79fd160cd985eaf86740515357c0c3c946cf8791b287b36ef69346307703e9f9dc2a7beff9968b24f944d1ae85a2b99a9ad3081c52efb

    • C:\Users\Admin\AppData\Local\Temp\24d5ccb296d91cebe59ce6d5e86ddc9b.doc
      Filesize

      71KB

      MD5

      aa76b5b78fc59808c2002d822eb14302

      SHA1

      94ab695357a70a4304f706bcbbc9efe98a98c24d

      SHA256

      799b3f9707cbb070fc9f8d1ba791684de6ed2a14e0f97dc58d57f93dbaebf525

      SHA512

      37e9b4a32b79d37285ea629e4a5adbf4c2af3a035850a34261f6050dee7378a267837709821ba0822cc27197ecc5ed4aa35942c861a113c950927a585b1e4124

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      28KB

      MD5

      7c1366ea0f776ff548ad8ed1aae2283e

      SHA1

      84ea02b4748043d4df45a3639fb79227c215a6bd

      SHA256

      5afb754b4aa3a8f7da0e800fad1c9424ecd5d6d8ea16a3c9b60856f2220a4a8f

      SHA512

      caa8469971e00f4b960a6d0dc5ad62d790cca8beb59420c3a3b2b47023bb3d74fb35b7eb1a8f5de6c7a5c796845fe6185f3115e2e4f6e947535aabec012e27f1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      25KB

      MD5

      c316c511879409af84ffdefa1c1c7aa2

      SHA1

      0882bdbda4504a3869b3cee7f6918ef5a6056b57

      SHA256

      24e7414a085971be1515eeb6afdc44eb60d752365a4fd0ea041e9340c3791f11

      SHA512

      ff3d53b8029ada5fd3dfc7a3474314da1e8cc513d57af42c89c13e7bbae1848c64449398424f58e03917cdd607d024adfe46f246079d5a7d87531e9b2d03fa93

    • C:\temp.tmp
      Filesize

      2KB

      MD5

      a88ac52b33911c3c0bcb6a942e714ddf

      SHA1

      0dcd851a8c5ba06dd87b29ba3361c14b57b40294

      SHA256

      bb625b292a9231e424869566ca93ea191bed5a08e83fb5a28706ca03a5b8a526

      SHA512

      10fd747767f276d15d7a7c6700adf127bf4eb15cef7a3cdd59a947fd6b94c614c40266412372f964a684579292f55c5270753e73bc2b1f3cf5f35a6d3f19a092

    • memory/1048-65-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-68-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-62-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-64-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-66-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1048-69-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-70-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-71-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-63-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-67-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-61-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-58-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-60-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-59-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-57-0x0000000000650000-0x0000000000750000-memory.dmp
      Filesize

      1024KB

    • memory/1048-180-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB