Analysis

  • max time kernel
    102s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 09:12

General

  • Target

    OverdueStatementofAccount1.docx

  • Size

    10KB

  • MD5

    397c47ede0b01a7145478c1c1ebfecad

  • SHA1

    2f8398ddc426bcbaac364e6339b77b8e807c8fa4

  • SHA256

    c14068b312c53040f23e40aca6a6251d2330b1ec6874061b50ebb7e6800fda29

  • SHA512

    7eed78e77302ca07dca6926bf1deb2a0c0630d749811a1fc3d45e19aefb88b0ccb953a3e3782cb43901dc72bda73e8b5e9dd466a2421d5a16c6fb08a51bd94af

  • SSDEEP

    192:ScIMmtPGT7G/bIwXOVORtKz5SEzBC4vNq6sM63SR:SPXuT+xXOVOSdhlqH2

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OverdueStatementofAccount1.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1048

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      c0912249f2ad016eae85b5f5ef146531

      SHA1

      4c7a58b764c65d18a741cb467aac0ad39a8c0651

      SHA256

      340078408639d9d0a27614bd6b32de82d8d7b916c0c735c25210c5f205074ef2

      SHA512

      5fe40995ba5f90c4c624d43b5064f6d342ed7584c429f095a202408a32c44695e2608c43ce6c76604d4c5f4ec92f3bfaef7d5e1c58109185671976d7f440cfa6

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{771686B6-EBCE-49F8-B937-B298D0FDC307}.FSD
      Filesize

      128KB

      MD5

      a2512b706494dc8ca24951bed0c24fa7

      SHA1

      0f978140cdb08af3020df8275a1b3e45920242d2

      SHA256

      2317db0dae28171e354dcaf6b96d2c908919657f1b36db83e6ba0d00454339ce

      SHA512

      70b64748cd56220eef83ac9747473a5b43a2023e184543e856615dafa223ccff54390810c7739e425091b1d4d843f521eb6f3e8a6849b0aef4be71ff509878f2

    • C:\Users\Admin\AppData\Local\Temp\{9BD17C02-4B5F-414A-924A-E506A6072A94}
      Filesize

      128KB

      MD5

      bdace27e0bcdd413008fe8e85cadac14

      SHA1

      60a4b37697491c64a3fb891946c339e62ccff7a9

      SHA256

      304488af1431d5eb87c69320b91b330fe9076701f77040a13c77535d569194c3

      SHA512

      8579d353de559d22ee3d9099b00f16b1787ab38a575215d062ff4ac131bae925250257cd9c3b8e6c8c84a8321003c6b29856e8b55f45e7acd36ad2e9da816f1c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      70e46e90f0b88f54594b8dcf0c0f4a61

      SHA1

      6d4484ff852864fb8b34b0c506908238e9c3664c

      SHA256

      71e043e3ae15916c3336c878efbb6130adfe1392ac8ec1e23d664221599c86d7

      SHA512

      8c6d995783c2858a195f2111216c5069acf2adddbe5e3d699734611449aca701852e1af2af5d6c0d97347fd6fca64210c5e2e14a4384c8bda09bf95702b3a752

    • memory/1732-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1732-139-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB