Analysis

  • max time kernel
    102s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2023 14:35

General

  • Target

    c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc

  • Size

    679KB

  • MD5

    7f075616272cca52e731c11080d0f3ef

  • SHA1

    b5142fe556fc114eb221c4b14ad9d19c9e83fe83

  • SHA256

    c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12

  • SHA512

    f9fe3bb4f04138c8c924a74f35c293cbe3e777a6f2993c0352e4de9f6677807fcb982190d2a070925ee7a6810a136f2f7c1358babe5e8087736513f6b77982a7

  • SSDEEP

    12288:WXQnnE6+s3WsZ/lkwR939lgKFWRg1xY0VcRuaHuatAUz3huJ7XrjaJ+:WXQnnYsNHXR9NlgobVcUK7UXrj++

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c2d55f54c26d6f73908c7138e999fadcb9a8617fea8f56cee943f93956adfa12.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:596

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\967C146C.emf
      Filesize

      5KB

      MD5

      d5c5e16f5d1a574b4643ca75feeff934

      SHA1

      3a4498112d3c8196b87120923c449db83477129c

      SHA256

      b32ef8a281ffc811ed9fb7ac4a27cea7cee2d95e5f98e5aab7e6c3c549522c52

      SHA512

      1c08179c39b678d8aaf15024db1d83d50170c82b8986c180a9c2318eeb60358424b96c4b5443d9c983e1e8df3d31512bb6bff4e95ec35d45224b57593d4adab0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c60285b6ad7f17d5c6a7e88c3d09f248

      SHA1

      81da243598272033a580556098e2da0282a32802

      SHA256

      8fea8679c91039905c6714500fb8a0e42583ec8c7b7a885de7bd60bb4634aea1

      SHA512

      08e15e10366ca793eb55c980d06906aa6937920d6b5bb469942fc9d005d48a6dd4e4e8a56d93d6308165082be25f8a4d7a329a0b670f9ae76042aa60dd055e29

    • memory/1536-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1536-87-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB