Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 08:52

General

  • Target

    Challenge_FIles/Employees_Contact_Audit_Oct_2021.docx

  • Size

    12KB

  • MD5

    d5742309ba8146be9eab4396fde77e4e

  • SHA1

    8aaa79ee4a81d02e1023a03aee62a47162a9ff04

  • SHA256

    ed2b9e22aef3e545814519151528b2d11a5e73d1b2119c067e672b653ab6855a

  • SHA512

    37367ea06191c8a949f6c092bc4137736b344cc9892bf8a19e149557919d9276fb1301009a700cede0f2ca05d6827c827992817aee7b8968a5429e433fe0c8ba

  • SSDEEP

    192:60L6GkWglL+bzW6mlHRrZu87Fym3tZknRIhRHNwC3Eo+ETdlexwDvx/jVm9CoDFn:603kpLTZJHm+Eo+ETd4weCoDFLFd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Challenge_FIles\Employees_Contact_Audit_Oct_2021.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{38600153-3AF1-4057-8A91-EFF71CB300CF}.FSD

      Filesize

      128KB

      MD5

      e3298bb90d8fa0d47bb1ecaffc26adf6

      SHA1

      bced8a2843e0a959f2788d929d9f186ddab9c087

      SHA256

      185a6b13cc6c946129954bd7caf54ebc28e574bdb06cf2bbce9c507fef804c4d

      SHA512

      edfee70619db6c321da5a49a8eb88a805382d92dd20bb26e927e2fafe01d25c0b059476fa214d3a0ca30e11ccc436cf51352ed1198bedbddf82f3abdff808ad2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      9ea54395a9172a0cbb2cb104032acecf

      SHA1

      47d82d70b8a44310e54d8dc773976213d423c34b

      SHA256

      f12f51a578c3248abff76aa064488a0498b35dba207b95a0e110ec3a4672edd0

      SHA512

      e1dfc7ee106adbe80dc9d549277fbbe5fb551091f373d5c05fa795c3bd7532e3d45a1213d9509aef2a28ac51a10265c386fd726b725e2fc1ca4ff02f92676b36

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\186K4QOS\note[1].htm

      Filesize

      8KB

      MD5

      064c4d10430072833b6b65b2cce02cf3

      SHA1

      45c600e484875f7d8b5b8692f250975d6652e331

      SHA256

      5fc8fe9f3743c5f36080525dd12c62f7da4d6ce590772e2aa41be879f67cd575

      SHA512

      e59c82c735d7448a92e066db38b951bcbcafa637396fb9327ca186cde9cb87400a2b0a56f741d706c2567061583a137da171537a27207db217b7f8788b7b9531

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9B067CF4.dat

      Filesize

      52B

      MD5

      07ffeff17a8a1a1209ab3c2690d569d4

      SHA1

      37cb513fabddcdbbaa2e7296b31a4bc9832e1b01

      SHA256

      57cfa30bb860b95b7012ed62427025959b671d270aaf67fc406fbc3c4f3c48d4

      SHA512

      743591e7bfe9936eee057c9d1769595d48c90ba28057d8ebd0f7299b8fcacd7b8fa50af30bd0b8b6e09f77ade16b47d6f0abb079d60e975443a57c514099ad86

    • C:\Users\Admin\AppData\Local\Temp\{CEE0A564-289C-4735-BE80-6C7FDAF69C94}

      Filesize

      128KB

      MD5

      8b092ff9c30ebd39e317638f8a4b6499

      SHA1

      c7f60aa916cc80b5c3caa41688af2f66cc232414

      SHA256

      d98763c3d89e5932ed0583ebb88359e79c50e018394e69f18a13836109073cca

      SHA512

      ed35af0bba60eb38cdd6b82b3fdcd29b39b2551c90557a01677ff205043646ff77d2d5bb70e52723377ce95f9f390668ad85144d9eb8d050322d7deeae55ee47

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2976-0-0x000000002F240000-0x000000002F39D000-memory.dmp

      Filesize

      1.4MB

    • memory/2976-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2976-2-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/2976-85-0x000000002F240000-0x000000002F39D000-memory.dmp

      Filesize

      1.4MB

    • memory/2976-93-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB