Analysis

  • max time kernel
    125s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2023, 10:50

General

  • Target

    sample.docx

  • Size

    10KB

  • MD5

    52945af1def85b171870b31fa4782e52

  • SHA1

    06727ffda60359236a8029e0b3e8a0fd11c23313

  • SHA256

    4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784

  • SHA512

    58849f65d1ef86eacb905569919975d88094e075f6cd23efc4b481ad17af2c475a9834178f3ffcb4cd3ac984d21ed8dc1919141133c19fd647ca48a8d3e2b183

  • SSDEEP

    192:AEhM7fIUU09264wptGheab8h7Z/c+8poF1d3jvvtl59rGxjPQDasYBcG7h+:AqWfIz092hwLGAabkcfa7pr1lzyxjPQ9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1328

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{DA692A55-963D-4F97-A07B-34B413FF99B8}.FSD

            Filesize

            128KB

            MD5

            86c78ab62ddf38e22c8e957970d8960f

            SHA1

            25a5a2dee2a284f1979d703184aa8bc847ecdced

            SHA256

            e6f14153dde912250b5c473c7d48816f4a93028d37feb1f4ab46635c838341ae

            SHA512

            e384df5ee05e13cd0db8ea0fd83e1cf496f48a955faad84bb7fc848c8a5500369e7df3d7fdb0abd71d293c65e19be1f960df1f50079722e23af5d5636897dfaf

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            19cc80fbe389fa309e0d501e2abc6e5f

            SHA1

            5729821897cacf33e416e3443429a57f94df79e2

            SHA256

            de9be200ec1a7170d8efb82d535cf875bc71bed522fdaa02de91e2bb4022e56f

            SHA512

            c9f58872457140e0ab01f8b3a924a481d64392cf406b6996b2091c656756d7979b0bed59b038d060c54be4bbe0af9bca5664437a27c5e4b85b8d472cc43c2373

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{1DE499FE-9C60-4B19-A964-6173B6F92971}.FSD

            Filesize

            128KB

            MD5

            7dad752199978102061a8dc4d564a017

            SHA1

            3a0bcffb3540d7426fca74a2a12a6e1c915396b4

            SHA256

            3e89a3fc13226dcdc9ae70803381fbb1d31441e89944b57a5ad0f1486eb012aa

            SHA512

            09d3398bbef63f69c91c78e28e2a46fcf0dee6c3b5515e4e302ce4443c21e9ec3cd403766df1b16cfc7903f4fc073ee79f9ac8f54811cbbf7b7763c5d765708d

          • C:\Users\Admin\AppData\Local\Temp\{3AE9C32E-73F9-4E59-9414-3E81225A8B63}

            Filesize

            128KB

            MD5

            ac8907b848ac18c8bb86455b31603930

            SHA1

            c955a7d698bbe4125b2f094fb8431753c6223483

            SHA256

            4fc312237d40cf4fdf7e248bc341f9936027fe9c7969917b05c52a7454817e41

            SHA512

            ae3f6e34917aad178c18ffae70453b695ec71d374d954df48a9d23bc760e9c80efd19fb07e9f9979af922dfa9651e6b9c03e45ceb495b3c477bbeaf31608c5e1

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            01f2938d31dbbce8de492646bc762d8e

            SHA1

            6857cf449a91f78fb846007501b2b3269c9e6c24

            SHA256

            42092198bd5829d83ecc5b560b3011403df198735972557890f5ccd57724be73

            SHA512

            befa57eade07ed10f0f3c107131e7af4e86b7baab76879b09ec8599d60d0751e94c39fb453646e4df4291baa76326009ff345f144bc21ef60259481fec59c4c7

          • memory/1628-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1628-142-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB