Analysis

  • max time kernel
    133s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2023, 00:07 UTC

General

  • Target

    05-2022-0438.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\05-2022-0438.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1412

    Network

    • flag-us
      DNS
      www.xmlformats.com
      WINWORD.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.xmlformats.com
      IN A
      Response
    No results found
    • 8.8.8.8:53
      www.xmlformats.com
      dns
      WINWORD.EXE
      64 B
      137 B
      1
      1

      DNS Request

      www.xmlformats.com

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      f8ad25ee28aa17070a1b41860d0f1fbc

      SHA1

      5ecd7a2913401adf0c5e0e85463c0f9e951c0e0f

      SHA256

      6d7cc68a03741d69c21fd042c3800780f5020b00958b83de6f728aa54c023ca9

      SHA512

      e002a9eac65928eec1b9c613d464c4e15b6c26d18f0fb06fab6e36070316faa7ddb87fa5d317221f64c7913b848b705d18b4e01698344a466f41d9256b48de8f

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      98c9d276f18cefe81811656666bed5c6

      SHA1

      91403f0c9140255185ddaf29caa9d1d833d66330

      SHA256

      f0e5af40d9e739453050f5a1b04f2eff6a8305f611954961a3f4bd4572e363f5

      SHA512

      6ef6c9757330ef2fc382ffa9c406e12b0e683ed09f1d4276e4f27d55d037b1324494496467177e398a2deead11ad2af74668ba6586d44cc27f1b939ab2fbdf85

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{69525226-725E-47CA-9065-84C248F06F88}.FSD

      Filesize

      128KB

      MD5

      c9284454bd32c22d5c2937b890d64303

      SHA1

      00b708f766ee5398d997a2d2aaa4f6dff57f9ce9

      SHA256

      30c2165b58d076a7aec911fdb1d794ca1c37500a91b167c0f8e505e30e7fa2ed

      SHA512

      28fd8c82a2c0f3adf7f59ac6d49545648975e3014b3e13ee99344ce81e89f19bfc22377687df1210886dde6b91c23a574f91a5b9b82b1952c0ec5580f82a5ae8

    • C:\Users\Admin\AppData\Local\Temp\{F2358157-EFD0-4674-A11B-7D2DC6A32C25}

      Filesize

      128KB

      MD5

      7b8705f3ed3586aba4bb7a890111f8c6

      SHA1

      e7324cb485e3458249d22a9b8f944a9087207706

      SHA256

      45e74bd0768433fe616b354b8f44bf64f8ed8ca75903e2744bcfb6abbf89954d

      SHA512

      098840001440c59ea1b126dc31ce271c63cfcdaffbb84e392dc9839587c4e8b2f72f0ca30728a07555556a23ce6bb865241cc22e0c59adeef264204cb0a3a9ce

    • memory/1676-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.