Analysis

  • max time kernel
    45s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 18:54

General

  • Target

    cb0dedfe45e2815974984b5e2ac6cdfd9d63bcc707ff1ed5ad95c919497b5efb.doc

  • Size

    129KB

  • MD5

    a0f20cd73ab21c559431425a99543a1c

  • SHA1

    c5dea3856583e6e7f83ee8f32e20519ad9c3c4fe

  • SHA256

    cb0dedfe45e2815974984b5e2ac6cdfd9d63bcc707ff1ed5ad95c919497b5efb

  • SHA512

    4843065ef09267e92f5d2bd87816f5841647d13396d0e38614827dc2ac2112244a4e5a180afe3be8c9aac1f8f40343ee7df8f8682bf8c4473d0e918535e568d9

  • SSDEEP

    1536:AVPBtmkSU1mSYYe0Mpd/Opmh95ikkO4MrYIE47RYQZt14nziknsLkEg:AdT5YYexh9ok2bIL7RNz15g

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cb0dedfe45e2815974984b5e2ac6cdfd9d63bcc707ff1ed5ad95c919497b5efb.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1980

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{D74F997D-D753-42DD-916B-789354F91993}.FSD
      Filesize

      128KB

      MD5

      b86e4b8e4e972836f19e9d692d72b297

      SHA1

      9021fd2d72a3e9ed9ce5aeec8f5bd07daff1c593

      SHA256

      13b0c3ba43fe048107f01ac031e081578eef7ca39e7c0fe04890e2127b71e35c

      SHA512

      448f8ddaefee85634895802449cd07faaad4029aca257e1b216f74d4d9abb10da9170b49f494d7ee6938305b90044e3944f09b8e758cc60a96f6490b3a52e50f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f8f60b66aa1f4ab93f26fc2d41575fc1

      SHA1

      9809604237d8ebf2928cdb90d448f912b12f7c6b

      SHA256

      0e9e80daf2b53348811d9e2572fcbea0d0d02f09ad1b99283696bc5e93bab673

      SHA512

      2e2e1e1fac63da9e6d582edb89ae9fd517bf6f459b7bfd4590002e0b8e456a5abeb206c9cbf1098ecc9cdfe5ecbd3214ce0410ec5f36857899c12f85f62f0126

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{3339F1AF-48B3-4A40-AB37-D1532F5CB289}.FSD
      Filesize

      128KB

      MD5

      24a365d138820f44571b0bf5945a107d

      SHA1

      1a9073ebdf5befecb88616ecd89174ec6569fa7a

      SHA256

      754340b1b0637bf339f60f510c6885ebb58c30f9946ee918579b1af435dfaf55

      SHA512

      70bb5689a112488448082ff7d2f76ce77eef10f745c85121e6eb6390f1ed0e848bfaa4401e45c8fae6500a1b6cbda8ac96ae1a22542bc478b0a38d860e792155

    • C:\Users\Admin\AppData\Local\Temp\{179AA127-0381-4A56-973D-A71675517EBB}
      Filesize

      128KB

      MD5

      3d1399882deb5fc3c0a356528675d379

      SHA1

      7f0a18f4eebb5cd856dc5d339b51cab54a9c0ba0

      SHA256

      d384d7b9e53e6a0190aec6a39580e545819d7b3b73b7d991507144004a97bc56

      SHA512

      8256b5234abb63fdba4fe266aeb9dcc4e527e8ed2d11cf04b301abd1ecb8376eee4061819273cc9d745f49fc555785c04289d43bad80656785e822da86edd230

    • memory/1100-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB