Resubmissions

30-03-2023 07:38

230330-jgh1fabe73 8

30-03-2023 07:29

230330-jbfccsda5w 8

30-03-2023 07:24

230330-h8gq1sbd89 10

Analysis

  • max time kernel
    102s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2023 07:29

General

  • Target

    0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea.doc

  • Size

    532.3MB

  • MD5

    ac93db48d64557d335d318ce355ea4de

  • SHA1

    fa241a115d1a08ead7bd699a4e7723bb56817db4

  • SHA256

    0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea

  • SHA512

    6b15215d8a8cf278ca4e9b18ca0a9e7183e880fe38a42175b8f546380a41393009e4dbd8e64ac76b79913534a1e9daaa62d7d4c40482c75adb3373fe5a339658

  • SSDEEP

    6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 7 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      0fe2dc752b3ba90868a5d05ccd357231

      SHA1

      97a53fad6ecbef321dfce13aa06fe8ae997836c5

      SHA256

      76fcc9abb47d19ef5b9dc1ae59d0d0dc8a89285ba44b8f50e7da84156dc303ae

      SHA512

      e352c741f46852b5562c60bcdf2578b8f10add8d1b11b9db8b97109cf5880ae1c55bd798765b23406c7e63b72896f0099819d732bc4f9a0052a1b4050ee24ad1

    • memory/1624-90-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-163-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-81-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-80-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-79-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-84-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-85-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-86-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-87-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-88-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-82-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-83-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-94-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-92-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-91-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-93-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-95-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-96-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-97-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-98-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-121-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1624-205-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB

    • memory/1624-89-0x0000000000410000-0x0000000000510000-memory.dmp
      Filesize

      1024KB