Analysis

  • max time kernel
    102s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 01:55

General

  • Target

    45b50d42e8d827ca0373c12533211c33.docx

  • Size

    82KB

  • MD5

    45b50d42e8d827ca0373c12533211c33

  • SHA1

    b98a24144067ec3605e84158e12d6498222295ae

  • SHA256

    57cc5e44fd84d98942c45799f367db78adc36a5424b7f8d9319346f945f64a72

  • SHA512

    59c7b29562369f101277a60206ad5d870abfbcd7ce3054d63ff4506ee54d62021a284e39c36f46f74941f581ca04210a384a30db8d952098866986b46e2ed9c4

  • SSDEEP

    1536:OEtsRtMi1kMN/Q0uaZHeO8zsu37JG+VqI6yoAgcAR2q8pJhvJmQ7ho8:QtLSMdu4Mr3PVqI6yFzqUzi8

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\45b50d42e8d827ca0373c12533211c33.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2000

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{C8939379-A8AB-4531-BA27-464415A5513F}.FSD

      Filesize

      128KB

      MD5

      83c8cb173d8edfb5775346e74ec172d1

      SHA1

      23b81b605df7f78885efc6c7827fa0dafc8bfd23

      SHA256

      71c72ca12500c3e03776982b449c197152af74b619edff40ddb00583f5eeaef7

      SHA512

      ef66b8f2bd2671cbccd5c65f15456f610e288c9f6dfbf39c9ed4eea063d7e78b6d478cdb3d5064faf5ef8d2e7eb5da7181ab0b1a366d45a30df4604c72913446

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      772b33ec26cbca7e2166bfd2a715efc6

      SHA1

      47b8dbcc350ba63d902367448bb9dabb41417e80

      SHA256

      9f9f8e9fec2c135f656ee99b93bf6ecca2b22d41fb76b3a09481df83ed1000f2

      SHA512

      9431acc63112b4fca5fe4062b44aafe5bd5c061432b0223390523b128693eba7773598d611dc9d6c28a434aab1f0d1d8d8f80bf76edac27ac68a95aa403ba0de

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{C2EE4A79-4782-4A64-A1C0-C9AD4235B2FA}.FSD

      Filesize

      128KB

      MD5

      adcc628d6c6f88a345872a9efbc5b5ad

      SHA1

      bbcdf25877b7ecd7a77a348c0e3eed4fffc8c7dd

      SHA256

      7ae80863ac7d313f01ece7b3f94446c1a01035999ca4eabaec2359015476d6db

      SHA512

      b56b083a2f50dabf4ff818391a784c7a81a5f0e49d87cc091e96ce52c67bbbf9abe064b1f54256a541e5e0465d81e2f26526d6b959a6c78655c9e36c398a8bf7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\invis[1].gif

      Filesize

      43B

      MD5

      74996e793f8888edd815ccfed177f5ee

      SHA1

      376e57f850a242cf780f6904ef4b54f0587067df

      SHA256

      cb725f174a86bcf23b5b9f53e5b60d53eaa1524f88f4dcec165670a3b0eb6c2c

      SHA512

      d45624e408962ab62232359c95aa36c373fc6ec20716f92051751c21f0c3625a254e47e65f0303c0fd620a8e44a80c4702fd3bcc97e764964eb52157acc3d93e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\download[1].htm

      Filesize

      78KB

      MD5

      919d175865a80bb373165eb260ba6384

      SHA1

      3f40bafb294dea03ef6780daee23cf22e13f0c34

      SHA256

      e7cbc8b6d5a038fbf65ac7948151016982589114655c69f9d310cbc139280b56

      SHA512

      dbeefca8a0a6b6474d564ef8b0919888f6596677a31985593c56539ffd8d4b0e171b0f071d6754e4a9ef9062f1e226c3a29a67a3761df2823ace468d086da0b5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\711CA140.wmf

      Filesize

      680B

      MD5

      c4faee9f144b5ff22e96bc73fca42c8c

      SHA1

      5684bf77919070bd4a5ce824fb328479c2d97800

      SHA256

      6b05348a687bb81b2628d1404d5b124b0f6c924b0777cfbde87e8489de230af2

      SHA512

      da343e96c1995246ea2c24ac6fc6f7839a7877f583d7fc41d69ff46cf4f6eff5a2fcf0383e016521dc1e70478fb81787eef2216626df5ea4e2a31e0567835069

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B95BD7B.wmf

      Filesize

      680B

      MD5

      66604893f1050b633582c5fce962ecd8

      SHA1

      9de8a5de2b61f1530fb55b349726ce4f57c70bed

      SHA256

      69b71a972c866dc377a6d1fdf193f8e930534535097f27214cd74e0d857feabf

      SHA512

      08b716fee2be919831e4d3989b307d308137bb16892135ebf963951e660c5c99c7491c372da086c8270bb2e234087f4dfcc9752a2ebeb721b597b4090f3d1bd6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7EB6F5D9.wmf

      Filesize

      642B

      MD5

      4f03b86e4d6631c26ff5fffc7332be1d

      SHA1

      14952a78ea51df67d5b5b6c6b4de3d96ba7935bd

      SHA256

      83f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851

      SHA512

      4bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632

    • C:\Users\Admin\AppData\Local\Temp\Tar3185.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\{55578E1D-12AB-4341-8A69-A6D6E0B03BBC}

      Filesize

      128KB

      MD5

      e6531fc619aa90b9f127054ea76ec849

      SHA1

      b9cb4fc5ee01792eefd25117348567dbfb06a181

      SHA256

      f58e2d0a18ea95442ebfdaf778d20ed57dbcf516c3d8307c320852c4892223e6

      SHA512

      adc6347f08e74a9875ee6c933f5ceefc7daf88a79606c5144a534eaf50359058553797c3cdd284da84bb9a0f8a240f2f1cb42868e0a36b5bb87ce04162c26454

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4a6922a2a1cf5762e5034ea324f0ceca

      SHA1

      7fc3c7bfcfec31b438311f26b1aa5693aede0c05

      SHA256

      41ef6568cdd93b6074f139608df64318e6bce2dfc8f946f741a33ad18c36ac39

      SHA512

      b89cc54f972a656239f5ce233f8f5836439be01f94916424839f1826a7397e84604a028adb6ad9f645b1911365121e085b2d29f49b1cb43da177862be27b0cf3

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2020-1209-0x0000000007120000-0x0000000007220000-memory.dmp

      Filesize

      1024KB

    • memory/2020-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2020-1245-0x0000000007120000-0x0000000007220000-memory.dmp

      Filesize

      1024KB

    • memory/2020-1270-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB