Analysis

  • max time kernel
    102s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2023 05:22

General

  • Target

    975ea012aff8d8dcc37638be840684e5.docx

  • Size

    10KB

  • MD5

    975ea012aff8d8dcc37638be840684e5

  • SHA1

    70b6fa43785aa7ef2ff4b28b0f03012cd5b9f06b

  • SHA256

    a2694a68b2edb61185dcbcafddf0889ad0d55150136d171674ce2e03a260c838

  • SHA512

    a1584ea14ac7931c041dbc2771f56993ddeac4a4984fdfad490cf7930ffa5c05212cdad6634704a585daa18266a39f60449b85d1ec5761bae2ebae216245985f

  • SSDEEP

    192:GEhM0o7Z/c+8poF1d3jvvtlsv9264wpKGhe/b8oCrGxjPCfZUUEc:GqlWcfa7pr1lY92hwsGA/bxCyxjPCfZF

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\975ea012aff8d8dcc37638be840684e5.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1860

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E189F17A-ABD7-493D-BC75-5AF992051A4A}.FSD

      Filesize

      128KB

      MD5

      aaaf968b5057334509875dbd5d636579

      SHA1

      6ba461f31db72750ba2d39efd60fe5d3a1136b52

      SHA256

      8e5ef173e4ee54ec67b15164a512b1701f12f1b80354a95610f6944eeddb6a0f

      SHA512

      60113f4323d1d2a25e3c277bd0275754c2007f128974d4707877c67cd352f7a2cea428a18bc5a04201971c18ada4810ee04324521603ac4393d90b746256dbd5

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      ddf1df1f620370054b3e84f2c5604c43

      SHA1

      7a9bc779172482cb8125e7a2fbd44bc38d265ad5

      SHA256

      1eb9442148e08eb87f06fa1995c0f5acc8da9674f895a30fec0ec10f0d6a3f7e

      SHA512

      95c1ceedd6c3b9af052fc9ce15cf0f014f97b139535a26efd8577caecf2ef15ebcb0f0f50d77482edd76910e2d8dbd2b81f2d8c22c792c984e87be90ce4b6265

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{B0D6AAFA-E55F-449E-8EE5-05185085770F}.FSD

      Filesize

      128KB

      MD5

      6a2d4bc7f81e696f24211ea59751f3f8

      SHA1

      71d9f5f8d95e0a689fbe9e1894cc480bec286dd1

      SHA256

      3612ff6b33f03fe136073aab6e3f1a69353fc1144f03ac8a1f89a9bc2cb67a4f

      SHA512

      3eb5ebf739c10573e5770b422dac141d8c718011273bb461c020f93a59c83dd995bba09a39103bee142363a154f34d6b8d60589f67e0506c718859c652f43d9b

    • C:\Users\Admin\AppData\Local\Temp\{557448FC-4FE0-407E-B033-A654676642EB}

      Filesize

      128KB

      MD5

      90df019e8fdc38471abacf999a444c49

      SHA1

      1368d7aada6993e77fc72bcd07b9b256acb8e76a

      SHA256

      0816c9169c6626fd3a1b9a02b0f8ebee6216f28786f7906c109c8a5f3a759fb7

      SHA512

      89a0738820507991acc54034e24926f8529aa39a1fde17300a56196e870476d1e3134a8fab371d63424336d4a2e431ec7f51e2f56529bc36545cc6500a468f7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      6806b55dfa05be41ddc497355093000f

      SHA1

      02e68e64ff59050202bbdf161b2fb77aab9d261a

      SHA256

      18028724e3caf11565cabb51f794f24bea1b6cc7c7325861eb706fb3577dcdd3

      SHA512

      590d356410e85fe36ead310ce1ea3dae4239e613582ee3755bddbe0c2f6850d87be0c621dc7ae635a445876d56a9370603b27287faa2ceedd9889b1f389ca4d7

    • memory/1996-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1996-142-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB