Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2023, 12:27

General

  • Target

    shipping documents.docx

  • Size

    97KB

  • MD5

    42675fbaed86a5c561977a14c9071fcb

  • SHA1

    7e8d25d1c5dd3b22c18c7c20b9072f4254f5559c

  • SHA256

    0764e5b7148eb1fae000ee79779f575eab5889b30669314cfd7d5fe477d5879e

  • SHA512

    56187ae0846c714054d39991bc76e68eb7428499aaef51f5bdf5aadd5d58e372be82ddaabbe76059e5f368700d851e2923b26a84a5445a58fb915728fcc7cb42

  • SSDEEP

    1536:sr6pdgZo0A3PuJZo0A3PuIv8o2HIbD4TZV/yFaAzodrAZAkdZo0A3PukZo0A3PuT:K6pC6I6dd1E91yrKAZA86d6CcNe6W3

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\shipping documents.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1876

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4AAF342B-A6F3-418D-AF20-F353A7C97A59}.FSD

      Filesize

      128KB

      MD5

      83a1e570843fdffae467cf04a2b1b983

      SHA1

      54cbc36ad3787615af51ff9e819e9ac4ddcc5f17

      SHA256

      d297376023d7918c22a08d2f9b7c4d2cd81e7f7b75a4056e0a102f5bfae1f415

      SHA512

      1e32e9bf1990a09db9cc3c6f0961d2ce792b9936f6f234ee42fc0788560d54e2a6eade786e23955c8435bd19e351516d0a4ee1a92164f5f53299377a4f7f44be

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      fcb6c0aec18e974768c40a752b754814

      SHA1

      c3c49460cf7c91c102fd634622aea1b4173b705e

      SHA256

      d0f30655b49ec901b44a3f911b57d4c888d631e8f1267d40dba948b1c83e9f31

      SHA512

      082008105b221aea8065710f4e2a4b33df182db766dae33eab425975b201513b94596cf9d2bc94e3c581da6de5fb5ca1c806fc7930a60c4646eed9ee64fa1038

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      d3a3c0a696b812b714e4501b2f9e5f63

      SHA1

      29a698030ddc0338362e0790e115bd5c89ba81a0

      SHA256

      5fa84d8b02677ee9a9406cb14c5e7b5e6d80b609cf3cf7786ca067ebecea0c03

      SHA512

      bb4117b5e92973209a5b45dfe52459dfda3894b0bf7cd45082bdf8f08f71b79ae52e2c5dcdc6b3ac61e9570288022797f98d6a2f0747caea6d4cf9d266cf9cf0

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{6A3D8A25-E2CB-479D-A906-D606418BC14D}.FSD

      Filesize

      128KB

      MD5

      c2f12a2d5bc8eb4dfd7a4470d84ab07e

      SHA1

      30d2b85042cce55f85a3a3376d775241a551a3d4

      SHA256

      cc487ab979392dffda581adbf8b278c4e75a0fcc7b7aa976cda09842dfb6d608

      SHA512

      d3c92f8fcca128f561e06c19f0d8fea5bb2e2e6c5a9a524f9fdbc44182c2c296c8dc15e3904902a5cf7b39827ab7b16b88baaed3fae2bdf58d5db0be79398275

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\VIsH[1].htm

      Filesize

      4KB

      MD5

      545a7a9359df53d20d19f54aa5add87e

      SHA1

      6d4b7394955e6319ae960305ebd5ec6c6ac9b660

      SHA256

      9f9d434c45f6e7fb058ad5890df4f3baec252fc9ffb63f311edae50b1f7365a9

      SHA512

      1e5e17174717e00ab62bb114c19a1904982fc739e13346f34c6d952bfe6003fc40659b3935088d592ec5caca5b4357e93df376f8a1e0536ae80ec58c1ce2c6c9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\301080BC.wmf

      Filesize

      508B

      MD5

      031eb86e247e1920cfe61b3493a8ff32

      SHA1

      2e0c58ad20872758f85a6fdf0e546e79f02b1a99

      SHA256

      905b8d77e0d414ed5d2eabed1e4d51995aa9f3ff7249dad3da0baf1ba3dbfaa9

      SHA512

      a8ca0a0d58cf01098ba42ea32ba619e7d9248747e331c84ef21cc2d58f19eaf179b6af45b0765694b065441c38e5e709b470af45b14ca3eb3beec1f821cab2cd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\967D718D.wmf

      Filesize

      508B

      MD5

      719956d88316de5739aff81f25c00fe5

      SHA1

      58b8a05a3af4b61eb1f9cac5c803e3db661fe748

      SHA256

      5eaa5d1508d86ef389d010120a129ea135df6addbc0d16fd7cac6a9b9dc43448

      SHA512

      f00178b798a7e87032d23a0ec26afa4ff39dfbb15c431421334944a95fc6024fa497611533d13fc6e32aecf2135e30d6566d5014fb189d615c74f56896469da8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EAC679B1.wmf

      Filesize

      642B

      MD5

      4f03b86e4d6631c26ff5fffc7332be1d

      SHA1

      14952a78ea51df67d5b5b6c6b4de3d96ba7935bd

      SHA256

      83f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851

      SHA512

      4bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF900823.emf

      Filesize

      3KB

      MD5

      4a103fc1809c8ea381d2acb5380ef4f6

      SHA1

      6c81d37798c4d78c64e7d3ef7eb2acb317c9ff67

      SHA256

      1ab8f5abd845ffd0c61a61bb09bfcf20569b80b4496bccb58c623753cf40485c

      SHA512

      77da8ab022505d77f89749e97628caf4dd8414251cb673598acba8f7d30d1889037fab30094a6ce7dc47293697a6bef28b92364d00129b59d2fc3711c82650f5

    • C:\Users\Admin\AppData\Local\Temp\{7C986BD0-3EF6-4D55-B25E-726452ED4E97}

      Filesize

      128KB

      MD5

      7dfa2d938dca1417e379cea91a90aa1c

      SHA1

      04e5ad6821c05c86446311d951372e10d6c33e45

      SHA256

      1cf244e18a657b8a5349f01267469ae93cb9a91250d75381191725a742fad5a5

      SHA512

      96ce4d9e3fd4ef84349aa0d2e927d1c9033f5744ad0b7ee22cda6ed4777e01837088b5c4ce54f923cdef99a7a747732a91015dc4ff3dfdf9c6ddda9df1c81676

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fcd6e3ea7e551133420137dc44339044

      SHA1

      77087cc4563ea2b6dfeebaf7a7ab3e0e1113a418

      SHA256

      0d20c43375438cb3864368669493c3809ad138c64907849831104ab0de9506bb

      SHA512

      0c4c137ef69ddabe7626a539605228478caeedcde996523971e0e6b4533dfb281e76ff2bef7d4b52448749a0cd98b43b5df285469bfef8278b19a9ee8020a524

    • memory/2036-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2036-167-0x0000000007750000-0x0000000007850000-memory.dmp

      Filesize

      1024KB

    • memory/2036-286-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB