Analysis

  • max time kernel
    102s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2023, 01:06

General

  • Target

    0a8a4e2d462fb4b56ea98b25d5b1bdb3.docx

  • Size

    2.6MB

  • MD5

    0a8a4e2d462fb4b56ea98b25d5b1bdb3

  • SHA1

    2451fe1a52bcc7a202c443bb2c9f4a0c369e67e0

  • SHA256

    5816eb32cbaadfc3477c823293a8c49cdf690b443c8fa3c19f98399c143df2b3

  • SHA512

    133c7cfa4bc2ddd758d81bc14226814fe387fc8beabbadfd4101246d79b25a9a67aa8db2897180e0ff30932ce8e8c43e5ad9a05d051772406f54aae05c0708f9

  • SSDEEP

    49152:yKyWrBcD/KESkcCFcsGPthcmy2i7f8I/iUsBaDaMgIGqyzUvWU9G3eqiR+Rt/Dqn:ZcjSSFcsWcm3fXlmKEL9KxjbDZFu

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0a8a4e2d462fb4b56ea98b25d5b1bdb3.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{5722600C-B101-4A42-982E-BD1A389E4CFF}.FSD

      Filesize

      128KB

      MD5

      2546871aca8e7e15a2793ea41f8c93bc

      SHA1

      2b4417b4f7c592e578bd1c1dd12680cd2aff8f0b

      SHA256

      a71a0f22e5803a868c0309b4d8d510009a0e0e2ce439a4a106259f569748b172

      SHA512

      21d80dcc786e0c99a1ae5e982fb03af234398869c920ae7d6676e3b23a19c9c84001a7483679578d407a7fea7a6396a27f4da51701188ebdb206324890e71464

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      dcb18fa5e362f9d34cb0a1fcd2e95850

      SHA1

      c780b80d5ced093efebc76689664bc8cb0aad180

      SHA256

      bbd9bcbe02ee0b9a2a8ca649fa033420827626dbf09c7f323b3be1c46708bf93

      SHA512

      fe0a33855f981d60679520b8cc2601e9a08e339f75cf0338b69c173e0f68935ad7da493069159231caaabccd0090989b98f3a9067ae2ad62f63323f4c71758ad

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A4D15F71-A850-4CBB-9E29-F584FD667C02}.FSD

      Filesize

      128KB

      MD5

      b96c292ac8dd18da13a1feade78ad26a

      SHA1

      34142f5a7c8ce92fcf3ed087f9a35f4a361ae661

      SHA256

      45c8b9bd0df8dfe7825739cfa5171a3853245582ef4a76b865dda24ca1f484fd

      SHA512

      b3b22ab965d7bd2bdb6886f54d8080e917643f78aaa53514ff772bda801335607a231d705c085cfe9f0dd9965417be64f42d9d2e31a5682345f1a9666fd94b10

    • C:\Users\Admin\AppData\Local\Temp\{6214554B-08C8-4277-A255-BAF9A9543A82}

      Filesize

      128KB

      MD5

      3c5194f28996fda0c7d5eecfceeaabf7

      SHA1

      d279205e4ec0f1e4d0789e62e8629b05ab4ad8e7

      SHA256

      73ed08cd6b1e6f75ca5ca44ab3f28ff77d0a92d58e7cca131fdb5c20a2083f1f

      SHA512

      62b4dd3dfc1b0c16748cef71ba617bd9af844aab51b30f3684621cc4c7f86c7d9ebbbfc1b2e8b9ed0a66261b44f8fe081bf2cde74c8b4c7c1c759a088db5f05d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c1b952a20151f8426f9fb35b362f0449

      SHA1

      d4fb86bd804b534bd7fe14d73846e30c36b48cb8

      SHA256

      ea0b88cf297c20260f85745c1a76cf183f1e623df5fe9648486815a13d40cec3

      SHA512

      101c2ca95b2a7e9df395b3d7ebbcb7338111fb4126d6de0da028922a5348e2bbaa46a6f940979191e60ef9355f6cfb3a6870b9ceffd8c7103a50b1d950253114

    • memory/1612-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1612-154-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB