Resubmissions

28-03-2023 08:56

230328-kv898abg5x 10

28-03-2023 08:53

230328-ktflhsaa23 10

Analysis

  • max time kernel
    102s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 08:53

General

  • Target

    Payment Advice 032823.docx

  • Size

    10KB

  • MD5

    1a6d4bbc6c6ccc40a1bd6fc5c55b4d60

  • SHA1

    f046b18b8ff42f6cdcfa89003b9998b0c26c3f3a

  • SHA256

    05971ebf80c79445483d359ca3ae40543a60edd7ea9631e847f544a844a1b78b

  • SHA512

    558449dce679477277c396c01e8a823929b2f0c5b9f079f243e7e2b7895a107b659b85a6dbfc9146730cc59f9bdd995b27f4ee68a312dedaf2270e128c21a491

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOkml+CVWBXJC0c3OR:SPXU/slT+LO9HkZC9a

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Payment Advice 032823.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1036

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9B8C8646-0793-458D-AF91-C40237A71B29}.FSD
      Filesize

      128KB

      MD5

      7a64d39ea514761a6158b1b56c31cddf

      SHA1

      bb9707207063e5ab4f52d326a1382fcdbc4f9e92

      SHA256

      5e4ff71371d6a40bb54855f961ad32b1551e3c1052dd193bebf1cb4616e38213

      SHA512

      04e2fb4cce06c268a173c596ef22b8b617f1b25327a0fae84c01781345eb5f141b888446f2d1d2a7e13f7335211beda52733ffedc65aed734834c8c5f2de285a

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      28240fc1fb00daef1c316b0d9d0cce13

      SHA1

      dcfd78b91509a41665862a5dab8c79e1bae3413f

      SHA256

      46fc9cde06b7fba30736ce44122ec30c92c803b4588c652fa8157c8961a790f3

      SHA512

      c21dd52c4f464aaf47859a72aa5b03c853aa7ab2854a9650c719d86c60f613ecd3cb2a3e7e6e8c193fb7abfc92c950cf74ec6f65c3fad375fd1d827a88f7114c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{CCD67061-BD93-4298-986C-3D68B1CA460C}.FSD
      Filesize

      128KB

      MD5

      903e8c0cde27843a30e34c1fda40f9ab

      SHA1

      eb6c548b8118d36fb7b8eedc9ae89d692f5405d4

      SHA256

      701997e6e6dc0905bdf70cf3484c092fa0c54fcf9c2d7d7ef679f45f096eb6cd

      SHA512

      a117d6168d19ea581dfb257c7d22ec918fe8c3732a153408687a12f3144d2b6eb12b3d1cb9e030594ecc8c5551e721ffc98aa51ebd2f79b5066ff10cacfe6bc2

    • C:\Users\Admin\AppData\Local\Temp\{933FB6F8-865E-4299-BD78-CBCD747FC864}
      Filesize

      128KB

      MD5

      96ce41333cd11b81252c77a6ad3c2d98

      SHA1

      4b0d2371348e9392dd7878066fd33753fb06f078

      SHA256

      d29d14feb090caaafaea7a94d44334e89da831b95db29b871acc52b9868610e9

      SHA512

      4ded37d1bed1b814476200f9738d544b0b6a6c7b471170bf9504bebadb8badac8c29d23a7a2fbee2573748352d59740cca0e147c9b0d8fa88d3c1d6551b80b7e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      aa4a9bec95d901c988eb04b7fbc90cc8

      SHA1

      59589550f1191a11db00f2582d99ec4a103f8e48

      SHA256

      00658baeb75088b9f24f9e4b5706ee41c9761b404d12df2ce315e09c2597f954

      SHA512

      32d67fbbc0a7fe335c45d097be64fc57b6fb6b59848bf312ddaf6af93a615fceab8545824539758483cf1e42d459b20b4f3f7fe024e69d8d943a413d52ae1ee2

    • memory/1108-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1108-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB