Analysis

  • max time kernel
    102s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2023 13:42

General

  • Target

    174A21F85A5BB52DC8A8AB2609C8032CC69EA6D7A58A2D4EF8C9262EF708B05C.docx

  • Size

    11KB

  • MD5

    a1158305bf2ebc9e3ea204dc7a7f1e05

  • SHA1

    42036be748b201442043153498db09389d641ccd

  • SHA256

    174a21f85a5bb52dc8a8ab2609c8032cc69ea6d7a58a2d4ef8c9262ef708b05c

  • SHA512

    afec0d30f1f7f157cc6da788d9f6cf9647db94301af4fc83ef0a00ec8464bb45d828b58de4a812db7eee2dd19774becfb94409ce8d2d57d05e17c44b0a4b8e5a

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBCwwiVp:aNxUyn0i13LROEiOLkX6Ujnw+3vwiVp

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\174A21F85A5BB52DC8A8AB2609C8032CC69EA6D7A58A2D4EF8C9262EF708B05C.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:440

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{3217B0BA-CC09-4122-9A5A-FDB4B7941A94}
      Filesize

      128KB

      MD5

      e9e55211f457260bd1c07209d2eb87f4

      SHA1

      5ec94e07db206e986b4aa89fac0e4f231edabe37

      SHA256

      288cedc061a73eefb016ee40d30915d355084d519d887ae69da2d1cf681c5d20

      SHA512

      54514b914be6903a412919031e9f2f9e026f985fe2c2e385ee308ef5bc7015734f2cd9fc4c7d837a339cf8f69f74f5c5f9a7967acd3639b4ed82b86be9f9904b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      467be26c0c32311ddc7b1a096aab7b97

      SHA1

      9e4c1481c021f9a74f2b8799c933482f36414ccf

      SHA256

      2763e27912f6dd23ff2264a08b0d667ab58a5c3fdda8b8724d549057ebaad3fa

      SHA512

      fafb83f351f685841528ebbd94733736f98f27cf640f2669dac765191c91d322a18e60017cf5655c70913e203fb16bce1dd501e976afe5d90f009e35aacea932

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/1556-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1556-148-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB