Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-03-2023 09:44

General

  • Target

    NEW BANK DETAILS.docx

  • Size

    10KB

  • MD5

    d081645209709dd28251abd10175d98c

  • SHA1

    360fb08d15811ab3831831510c342861c9c504fd

  • SHA256

    dfa836311bde19e3ff284c975e0633d52ec92e733ade92bea9ab114dda85ac10

  • SHA512

    f15b9f9620c94edf055343ce8c6233368cc11bac8459e4615923f75df03d589045af85b861a346a725878c928e174cd5a2d242910cdca8febae0baf25370cdb7

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOz6itl+CVWBXJC0c38m:SPXU/slT+LOFtHkZC9n

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEW BANK DETAILS.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:732

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E4FBCDCD-D522-4C7D-BC01-D1C7EB396C08}.FSD
      Filesize

      128KB

      MD5

      40c99d404a9a299fac06a611427a6f5d

      SHA1

      a81b6e82b833f50a269ca6c51e6a86593b58d5ea

      SHA256

      914d08c1eb366baaaae1380c0b7efb137149e1c65bd1e51f62d571af3e0f945c

      SHA512

      7080cccad24a552bf92c29b1e3307e8895d542ecfe160f1fc64bb9e52dc940bc56f832230ace8161563fd95799b5fc133adc907384b10f41e9bd129661ecb36c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f4785e34223e0d9f24c02c7ec7210e68

      SHA1

      9ee7889f540da250993a149761b6767c0ce47d4e

      SHA256

      20805f0b8673a2f2ffc7e7a5d7ce204c068d6a6308975f087ea7c0cdc820ccd9

      SHA512

      3c5b51fbb1a459e0f5e4a9c3698d8a4960f1c6c65310a3650f25e21d812a4611463555a5e49183ea4c14b81f831ad7dcc6c7ef5b9da274ef2b3359e1bbb88857

    • C:\Users\Admin\AppData\Local\Temp\{66683F31-6AF7-47D7-B968-057AA1DCA182}
      Filesize

      128KB

      MD5

      9ceac441de5dc26533f436f8e9a25782

      SHA1

      e71c5d7428edcf0b8758adc86b6a4ff984122976

      SHA256

      afc1327266161203bb8015df90245d174e492efa6e80120174d7db873a9c6155

      SHA512

      67cc6f51b223f650f2d8df36da0c29e8c742334248bab858e62e60b4a58d507ecffaf2d54d86adc44182b4c8acebd0df1e394d30a64f1179a8fd8002338db256

    • memory/2036-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB