Analysis

  • max time kernel
    101s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2023 13:39

General

  • Target

    0D9A51628CB6EF7CFA6074D8C6E89F61E2321BFBB39B7CE9A2E2D1972E0E163E.docx

  • Size

    11KB

  • MD5

    c94062b9a586d15cd884246aefb0a75b

  • SHA1

    22a13b5db65f00a9e91e8c37e496df25b5276e77

  • SHA256

    0d9a51628cb6ef7cfa6074d8c6e89f61e2321bfbb39b7ce9a2e2d1972e0e163e

  • SHA512

    18c9d7f96317d483093b5966cadb82e45a2310eea351b54f928554bef8c439cfd454a5a9ba0e1fe3ea1322d798e4d3c5cb9ed7496c545af3e5d822ecdba36fdb

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBCusiWVd:aNxUyn0i13LROEiOLkX6Ujnw+3VyVd

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0D9A51628CB6EF7CFA6074D8C6E89F61E2321BFBB39B7CE9A2E2D1972E0E163E.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1164

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{1DDACF67-5283-484F-8F1F-813117CBC888}.FSD
      Filesize

      128KB

      MD5

      eeb5551b5c17c132ea215c5ad4194d5f

      SHA1

      caef6d742f5a78b31443e190ac83d1477259ba33

      SHA256

      d44b1d9d5303fe7eb18cae4ed89f8611ad7da269f51039b7bcb100ddda668096

      SHA512

      8c2f1ac0f21e16724e7fff7a0450d3ece2e47360e5d3b6f44f78736d70b1cad672c4181c3473bc4cf6eae731949b5993cd0b0d63a5ed5af49049a77137e36aec

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      00eb57a061ee42623ba0bb905de3a2fa

      SHA1

      00d1623cda6105ddcda0b153d75691e35da54bc9

      SHA256

      91ef042b57e9bd9201610fa90b61419e3b3bcaf6d07c03908c2beb38f60a21ea

      SHA512

      93935295a8310d9ce52968609f2f75d65c97cd46c0cf5ecab066ef819ecc6df6cb78d0c96af06801ab52038ed9f7e65b37d971040a32199d3423eed4966f9a9d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8CBD85B3-2EB5-41A6-A01E-36DB14016427}.FSD
      Filesize

      128KB

      MD5

      904921c6f89de689e65fa30c4a0d16d4

      SHA1

      038b45f45616674a4caa87ae987fb993e2b8ffcd

      SHA256

      3e1db1fc64c8f2b699d6b695c75c7c0b751fe9ede3a6ba1b74603a226222459c

      SHA512

      05fafa33c62dabfaa2ca101b259a4d3bf8d48443d30979e66d5807e5bb4d8a3b3111b041433e8a05f25839df1d4a36903e431d9bb7d9987c104c5f371f3fb4a1

    • C:\Users\Admin\AppData\Local\Temp\{3AEC5328-757A-4FBD-8CD6-1FA190BF1091}
      Filesize

      128KB

      MD5

      ee2e24040391828ffff4d0d2d4caa5ce

      SHA1

      10ec32d90ecab618151902287bedc6d4a2f134c8

      SHA256

      541aae3062ce16decbf8fe15baf7f47efe313f36644dd6d5c34847043284e812

      SHA512

      50ac96458c95eb10a66ef711c64cdae77a126f356e554f3955775af306cb113c2adb5fb282983d0726060d9c1870a62fab960e86aa25bdcb46539a5598f1c5b0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c6a4f02db044edefb1454f1db648c235

      SHA1

      c27c13ced3f038f92dc2100ac2e02a32966af86d

      SHA256

      2d6f04924b299253d0b4994162aa396fcc22b8622958f71038599bdffb1424a0

      SHA512

      4dd65470e4bc56cab5ab60b6a76e8bad0cf81340b0f4c0ef0832165180b463acfc4bc368df6150fe78188fd0cc3db16880495f694cb08f60bb103a90c760005b

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2016-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2016-148-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB