Analysis

  • max time kernel
    548s
  • max time network
    418s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2023 07:47

General

  • Target

    SOA IN MAR CIMC GOLD WIDE.docx

  • Size

    10KB

  • MD5

    e7a99270307d43f47e0d74998ed250d3

  • SHA1

    0fbffbf6ac00806001eb45363c7415392cbf417c

  • SHA256

    795a1c1c050730c719805d5e41403cc900454b546796e55626cb513ca8406eff

  • SHA512

    e68b06887f4ca0b007cb74a3bc1141c3a2761bebd64b96af68520e9913a2847f6d493b0243b21b76bbfa60528226a84de417373f0351ea53869d0af51b797366

  • SSDEEP

    192:ScIMmtPGT7G/bIwXOVOJDm5SEzBC4vNq6sM63fe:SPXuT+xXOVOF0hlqHG

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SOA IN MAR CIMC GOLD WIDE.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F869C2BD-ADE5-40B2-9152-7B1CE46B0A79}.FSD
      Filesize

      128KB

      MD5

      f92862a0ddcc30cb27dc64327785cf9b

      SHA1

      9119e95503e3abde40e01682e9f3ada5b1c9f399

      SHA256

      64309eeb18b774f7011d04a25884e072ade84497c5ae7fae2a9c1637bbbd9264

      SHA512

      52f6fb3e1d94bff6baacb623d30bbc79bbb22064be6f53886833bfc816ab11cccf7acb42931d9d121ed4f3aed3834e3baed75c9c5cb9f5ae4cf6deee37cd8461

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      0e4ba59a097f56bdb4692218a8d8588e

      SHA1

      f15381cf67146ba92fe634871a3a99eff3ad185d

      SHA256

      eb9178135bb1b2c886df72036fa2044e4e6af7a29f7e7f5fae740b8be0658171

      SHA512

      8e91e48260d4789e655a75049bab24f45f144cab1f47b506a0dd66bfb7565b7a9ab326e0956ed4f02cd41c4485e822ef755795c032efd3176f3dfb6fc8e797a1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D395426A-E89C-4095-B7A1-1E3D9C57BBF5}.FSD
      Filesize

      128KB

      MD5

      38eec6033f1b440aa19d0ca7d3a85762

      SHA1

      fcac3d6d9354bed4f5322701c929bce5c16d1f62

      SHA256

      3f5f6f50411757046080cb08ba9c9037f878fd4388c32bf9cd138d53855cbd42

      SHA512

      5b866511afeda0093a311559f9552dd060aa5c667f5f1b84290db920d4856201fcc80905d97d3582ddd12a38fd1893851519ec9bc8fc20f3fe25ea99761bfd1b

    • C:\Users\Admin\AppData\Local\Temp\{1CF21863-D98E-44D7-89D9-EA042EA3EFBC}
      Filesize

      128KB

      MD5

      8b77402e99ebbb424685975cb7f97e0d

      SHA1

      452cd2bca183ac706872f798945a3a1a8209409b

      SHA256

      8ff3500866067bc620ffe64079792fd6716baa6fef4f2fd3657095109021d102

      SHA512

      2c594f1afc80dd3e53f71c01934e4d76893b7c09bdd7c01cacf33254976dd9f17ba320b75b4dc7a837989a1042a222ca5ccf585fab7b150b4c36e3323b6acc6b

    • memory/1060-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB