Analysis

  • max time kernel
    102s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 14:31

General

  • Target

    174A21F85A5BB52DC8A8AB2609C8032CC69EA6D7A58A2D4EF8C9262EF708B05C.docx

  • Size

    11KB

  • MD5

    a1158305bf2ebc9e3ea204dc7a7f1e05

  • SHA1

    42036be748b201442043153498db09389d641ccd

  • SHA256

    174a21f85a5bb52dc8a8ab2609c8032cc69ea6d7a58a2d4ef8c9262ef708b05c

  • SHA512

    afec0d30f1f7f157cc6da788d9f6cf9647db94301af4fc83ef0a00ec8464bb45d828b58de4a812db7eee2dd19774becfb94409ce8d2d57d05e17c44b0a4b8e5a

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBCwwiVp:aNxUyn0i13LROEiOLkX6Ujnw+3vwiVp

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\174A21F85A5BB52DC8A8AB2609C8032CC69EA6D7A58A2D4EF8C9262EF708B05C.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1944

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{599F67BF-866F-4133-8391-0BD8CD8B1C63}.FSD
      Filesize

      128KB

      MD5

      8bf534eac0268015985b2bdc74596fa3

      SHA1

      db10f8c8f5e0229bf795a5277368b2241fd7f088

      SHA256

      f787fdeb9355e2f185c6738b4a01d08a7538d8076637ec319b4ac0391c6a4f59

      SHA512

      de82f10426427f0be582e5963ca8cee8af0ec79bbc6eeb6293f1e56296e0fd2f7c44034f635e584069cf2a53df6ab5eb23f7af9630874e1d3e8c5c21a2d8dcaf

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      02effc2a3c2ec695dae8ffa92174daea

      SHA1

      8de21170baccb41d11494515d55a119040a81caa

      SHA256

      b291f91bd11367e03ca3c986894a89f6330ee2afbbdfa8fec80a4e7f6f99221a

      SHA512

      b111343eee48bd64274af31d21a16722dade92fdc01fdd45d672b57c9540ef4f1d7e58cd060a520c9078219c6d4377e6b018db972703d247951d327cf453931b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{ADD0B64E-E7D7-4E05-A848-0E4E7F4A1385}.FSD
      Filesize

      128KB

      MD5

      2b2e7835a1d70c370ef9839c0b96b4a9

      SHA1

      85ae21679ba4612bffb85132afe720587f9f6e21

      SHA256

      6d680dc5cf7877d4c18b16e7a7bff3acabb8a0cf018254727ff25aab30114d38

      SHA512

      daeefbadd31281e48525603829c26746bb16ec23bb31390a91a72b477877e6984abe9104cd150a96b8aa518b01049527b53f1b110f34844505550152e36b280f

    • C:\Users\Admin\AppData\Local\Temp\{438CDF26-6882-4A29-BEFB-B08F9A411042}
      Filesize

      128KB

      MD5

      6e5285513a37df1024f12d129786a042

      SHA1

      f59c4058f7e6bb42edc592e0fa7bab03c06f9b3f

      SHA256

      75628ffa06adaee37e9c755c5c0617cd51f3d68c0f04ccc30b62d16e153eaa8f

      SHA512

      9b8cce65cf330a0fd703a52e2e85b12657a623a77fde2ed93ac245f5b4c5d25f0b542235fa0974bcb5cb05ad93e612b0dab119a4733d068594d5c0fb7b1fd5cb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      df6fde0367b127dbf009e6f8fb331a33

      SHA1

      7d3ad1521c94b478feaf883b4b48110fccffae34

      SHA256

      c8c6a67a015b5856d96c0bbffb506ae9161ebd9dc8776cc7b86f98284676ddf7

      SHA512

      b6db37558dffbe362cb56c363d4a6ccf6ae1cea74bc04f3d57437298abcebbdceade12d8ed52280e21e4a453c126d6ddf2b4540ba3d3a0486a5c5c36156bfaad

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1676-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1676-148-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB