Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2023 09:10

General

  • Target

    Invoice 0629.docx

  • Size

    10KB

  • MD5

    7e892727e3588863b8e0c17e7916b007

  • SHA1

    3925fa7699beff7db034b37c3af483bc4bea4c6e

  • SHA256

    622311f58c79b0808257f6a330775c1bc692c72c6b615b81f5613569fd1c2e1d

  • SHA512

    f0998839a8a1c84fd83c758c7ac6e815bc1269b5600573f366631be39e800d850bb464da79bc654ef496cb71e65f6c69c0431ebfdc0a927fa1f41418539d69ff

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOLl+CVWBXJC0c3+e:SPXU/slT+LOLHkZC99

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invoice 0629.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{645FB73D-D502-4C2A-8509-3DA0C87A3BC8}.FSD
      Filesize

      128KB

      MD5

      c37c073b4a467bc0812500ddc2683d31

      SHA1

      93dafac489948dd732d71d476fe660cf0ab8508c

      SHA256

      a4964f03b43a76ca1ec043cd05354aacd16d1056a1b18ed70cb7f7bc513a4ee0

      SHA512

      3abddfa0e4eaabc4009c711faaab8aa52657d555e0147b1001c385be48522fd0fea8a742050341b9db6a24c34c07413e33fd55e87fbe128b84967789220e5486

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      a7d4f72aa24bf6c4fc040dc7a9b85d5f

      SHA1

      96b840116664e19836953d11ca364231974d23fe

      SHA256

      038536083c6a5a8be2cdc9fe9cf07a4dec39279107efa8914b72602849df78b1

      SHA512

      4c93e0ccc2b2b5d77e6b9f257fea805cb13562fcd75edc08364f8def78aa3e7b139a3f573aad50be2bbb0ad897816a0dec1433d1c67dfa2745ee265ca2815a8e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{9535CD24-68CC-4710-AEB5-08228A0CE0B8}.FSD
      Filesize

      128KB

      MD5

      4ed3ee34f82698f4d98f4e4b5af3b45c

      SHA1

      6bf9e6c8d232562afed9df73288285667728c392

      SHA256

      85615f44ac01f38c86b02787804abd639f23e449b9b175ed49171506105e98c3

      SHA512

      354c8498d162d064cf12bba37883f480dd486fd15520e00ee4e82160478a58b455cd0d68d9f2c19071c72bb66e3e8bea50441f4d4af23d3402a009ea8996f92d

    • C:\Users\Admin\AppData\Local\Temp\{3F60151C-666B-43C6-8781-D28D8B8CD00D}
      Filesize

      128KB

      MD5

      b42bd627650ed8823990b914ae9725a1

      SHA1

      85761e25db9a7486e488f817b8b75de4d6b355af

      SHA256

      b743a36cc155fbdf00fa821d0e9b9bb45da0e765f668bc4cb33f9de10df667f1

      SHA512

      ec222986279eadcd5d5260fe6b3b250924f59a3024964d9d8c5b54d695f7a1f6a6a03545d0de98b855ae64d3b358b022a29cdd7ce343a12b07c35cbf5187b06a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      63a2ced23e61e53b499d60d458afed6c

      SHA1

      68e97585fd37f83789b6cb62a5f10f401e94fed2

      SHA256

      6cdbbcb21dcee70a7a9784b5bf154ed1cefd1ebf553fdbda8592342b61e3c3cb

      SHA512

      d6ce77fcf2d206ca2a915879123d75a82227ae9960bb7c9d2b3d9ff35d8908ebc99262430e81cf3409d478e0be4d7057b37d48f1bb988da8801493d0c96dac00

    • memory/1712-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1712-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB