Analysis

  • max time kernel
    269s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2023 04:40

General

  • Target

    Challenge_FIles/Work_From_Home_Survey.docx

  • Size

    26KB

  • MD5

    41dacae2a33ee717abcc8011b705f2cb

  • SHA1

    4b35d14a2eab2b3a7e0b40b71955cdd36e06b4b9

  • SHA256

    84674acffba5101c8ac518019a9afe2a78a675ef3525a44dceddeed8a0092c69

  • SHA512

    11f7177dc3c8a804ff6450477e15aadd20fddac98205008db25a4f6ef69a54b7cb7c9dd0d7bdf1b1d317f306482d86ad5ef150530194de7d8dbe344203962648

  • SSDEEP

    768:8HVoVneOa0HD/vb9EVoiJWq8UCei96T8vuX3m86RAFvg5e:8QVvbvb9wnIq8OitP88eY5e

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Work_From_Home_Survey.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1928

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{6A98563E-9DC9-414B-81AF-78AD5DFE1611}.FSD
      Filesize

      128KB

      MD5

      b26516877db832b61b7ccabb25ecbaae

      SHA1

      3e3deb41d0bb64b559b8484ea8ea359c79a2f6b1

      SHA256

      d7a1996a6bd0da6a2d5c3175db3a98e85f47cad6c67399c092e1ba8f7c604da8

      SHA512

      81664bf7c0f89836e06e981e563bce042469571a31aa24f5126ee57d16cfe0aa323e3ad6e51eac191340b849fc612e6a4ee6c6ee367710726f09985800a4992c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      e59f720e4d217ef068c723b30cb0fe32

      SHA1

      ece16f5e1c0d147184d836830d375f4f697ca6bc

      SHA256

      cc47d14cbea46c2f39d8b0621de256f8dba0c06e1696003cb2b13e70e219c5ba

      SHA512

      108d4ba531d532732df1f6a918d021f4fa6bbed0bd8844899bcd527d39b512a7ffb07a2e8c871eedb550f8f9829c71f5156c53cf7817963cd810001a3b1d06bf

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{E4BE33CA-A7F5-471F-81C5-EADA50A0A2DF}.FSD
      Filesize

      128KB

      MD5

      f49032d74253992b54d58db66220afb6

      SHA1

      f4ddbd92a39deee5e558d8d19629af31fa3ea39b

      SHA256

      80ab8773833c63bc2e03e47f166b0cc5625e158c2f5cc6d41a5331679f871f1e

      SHA512

      e43b6067d29e09664dd5a8f95360ca9226af1fad67ab0061da88486636b56cebf04c20bcfebf000c123ca22e2d5cccb2b7f59a8b31ef4987c67631301fc4f06a

    • C:\Users\Admin\AppData\Local\Temp\{4AB3F316-65F6-48BE-A395-2E7F1C547B09}
      Filesize

      128KB

      MD5

      e0490126a6be84dcc295c941df0ec2dd

      SHA1

      a03844ef0ad4276a48afe10bfab595861043ade4

      SHA256

      bb48695c2cf1ef201e1ef6d6761200f933846d30f2a2863a8fe5b0d32e11b219

      SHA512

      30b4ce41114eb69f583808d4465db48ae2881233f8bab66df7ed39c9cc6c6871913dc9f14cddb9e3517e2a4c9ea981fafd12ca73834451bd7dd7942d20b20e5a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      4fb2a3bde6ff9cc4bf4c8e4558c0d5ec

      SHA1

      e1220ebdcfcdda28264341c71f217acef6184666

      SHA256

      b16b68eac0f2593a7a54e1dec1e288e72ee9a97cad2e2e8b1741ac109102ff8b

      SHA512

      2cf4a4cf88e032d104b97759edd176b93036edb67007ba30ea6cab234eaeed847cb80824c2b88d56bceafca936ab9c6e09999b206eedfc9f9c23447d0c3ab580

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1856-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1856-152-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB