Analysis

  • max time kernel
    113s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2023, 10:11

General

  • Target

    FILE-327481938.docx

  • Size

    9KB

  • MD5

    1c496eb476e23806de3a11e8992200de

  • SHA1

    45663742b46dc5e6b0d1c547a0e77443083d0136

  • SHA256

    0dc2e40be32a92354d1e3010fa16422ae2f9286cd44ecaa790b5b53037099747

  • SHA512

    98434f104dfd04d4a5dd3ea0b9bd62b0c04615135f6cc93679d427dfa7f89e3e206078351cac30da4f7d1bc90db6e08b8e08e9e47c7214650527793da1577c36

  • SSDEEP

    192:yya0NHpKhWQpcPrm3OzpJdJYfD4AloKhv96EcWeuDrLt:yyXHpKhWQIJdJY7z3wEHDft

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FILE-327481938.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1108

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{229E6F9E-52F8-4676-B21A-2BF8A5615A93}.FSD

          Filesize

          128KB

          MD5

          1d98362acdb602c0e132a1292a3661c7

          SHA1

          fddfc8824d810b676b3bb28ccc7b3a8e1b765120

          SHA256

          ff937e427a594a879a95a5bd0086f6c6d4cdfb36e2b33a3a671d70c3de183dd1

          SHA512

          cdd021c563573599b823f085c754dc1200f50ae6501ec8ff47cfce7f44f2277accfc5f884fd66ab7a8051b896efbfe4b4d5898483693de9a0690fcf326b13174

        • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

          Filesize

          128KB

          MD5

          58b78686881ef5cebb59a0b4cefba6dc

          SHA1

          80e07fc8b5047c10315d67fa2d1814e441e297ee

          SHA256

          f1989107dd4b8c60cc69a9ec05364df8a0f34bec3ec46ec510f4ea281d93aaa4

          SHA512

          268e0e2b95021546228f6786da87ceefe183939053e0f71edc7d777a06b60c49a4af842d7f7ac990a37094f770af689f8224ec0da0471c57f35ebb83ab19b25b

        • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{54280C1F-1461-4D7F-B2AB-2A9829B1BE29}.FSD

          Filesize

          128KB

          MD5

          ec7017d0d2a14a592a6eb9b18c7676dd

          SHA1

          dd59b964c1ef3b4df33313b4e659a4f4b63e5a63

          SHA256

          0c807effd31fcb547623e6dab66233363c760a0fbcbf0acb5ab57e7e44803825

          SHA512

          249b4af631d5d81a5cd72cb52f9f75a22a02625bdbaf66044eee86d89b17281e179700f6d7cfe404d3debe839e0f9010956b7c8588c44361d9b594712d1bcf7e

        • C:\Users\Admin\AppData\Local\Temp\{13D0A5F4-33E8-4128-97B5-EB72E0D6A6D0}

          Filesize

          128KB

          MD5

          1349cce7980309b20107c3db80154deb

          SHA1

          68787564f57ab58377af7adc348c788afed0f5b1

          SHA256

          3f2604e498cfc070849169b35a8365e4818cf40560395d8e805d7ccf87e3d857

          SHA512

          4853f7d7fdd477a4cab14876c2406eee7dfa5411b2bcf26816f5bb0db736a9b0c14a96d4b63bb04db3dbe0f55b7c64b61ed530fe221b2e4f88ec691259bd4dd4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

          Filesize

          20KB

          MD5

          0159a6e2532ecf04c30bb8ce49db520c

          SHA1

          cb7150ed8dc0e732aef3ee33ebe4e68f6d9d5f77

          SHA256

          59db3c0cba9a61aa69de4b9a05a649f507196a43139ab11fa07096047ef4f913

          SHA512

          c2b417d4cf2511ebb99fd08024639afef06eef556fbc3c7e1e7c4819443bc422846f59aba26d53eb47be257559cb960662c4e4ca34272feba7779666b9d93e8d

        • memory/1108-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1108-138-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB