Analysis

  • max time kernel
    133s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 00:07

General

  • Target

    05-2022-0438.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\05-2022-0438.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1412

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      f8ad25ee28aa17070a1b41860d0f1fbc

      SHA1

      5ecd7a2913401adf0c5e0e85463c0f9e951c0e0f

      SHA256

      6d7cc68a03741d69c21fd042c3800780f5020b00958b83de6f728aa54c023ca9

      SHA512

      e002a9eac65928eec1b9c613d464c4e15b6c26d18f0fb06fab6e36070316faa7ddb87fa5d317221f64c7913b848b705d18b4e01698344a466f41d9256b48de8f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      98c9d276f18cefe81811656666bed5c6

      SHA1

      91403f0c9140255185ddaf29caa9d1d833d66330

      SHA256

      f0e5af40d9e739453050f5a1b04f2eff6a8305f611954961a3f4bd4572e363f5

      SHA512

      6ef6c9757330ef2fc382ffa9c406e12b0e683ed09f1d4276e4f27d55d037b1324494496467177e398a2deead11ad2af74668ba6586d44cc27f1b939ab2fbdf85

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{69525226-725E-47CA-9065-84C248F06F88}.FSD

      Filesize

      128KB

      MD5

      c9284454bd32c22d5c2937b890d64303

      SHA1

      00b708f766ee5398d997a2d2aaa4f6dff57f9ce9

      SHA256

      30c2165b58d076a7aec911fdb1d794ca1c37500a91b167c0f8e505e30e7fa2ed

      SHA512

      28fd8c82a2c0f3adf7f59ac6d49545648975e3014b3e13ee99344ce81e89f19bfc22377687df1210886dde6b91c23a574f91a5b9b82b1952c0ec5580f82a5ae8

    • C:\Users\Admin\AppData\Local\Temp\{F2358157-EFD0-4674-A11B-7D2DC6A32C25}

      Filesize

      128KB

      MD5

      7b8705f3ed3586aba4bb7a890111f8c6

      SHA1

      e7324cb485e3458249d22a9b8f944a9087207706

      SHA256

      45e74bd0768433fe616b354b8f44bf64f8ed8ca75903e2744bcfb6abbf89954d

      SHA512

      098840001440c59ea1b126dc31ce271c63cfcdaffbb84e392dc9839587c4e8b2f72f0ca30728a07555556a23ce6bb865241cc22e0c59adeef264204cb0a3a9ce

    • memory/1676-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB